Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2019-15120 PoC — Kunena extension for Joomla! 跨站脚本漏洞

Source
Associated Vulnerability
Title:Kunena extension for Joomla! 跨站脚本漏洞 (CVE-2019-15120)
Description:Kunena extension for Joomla!是一套使用在Joomla!内容管理系统中的论坛组件。 Kunena extension 5.1.14之前版本中存在跨站脚本漏洞。该漏洞源于WEB应用缺少对客户端数据的正确验证。攻击者可利用该漏洞执行客户端代码。
Description
Exploit for XSS via BBCode on Kunena extension before 5.1.14 for Joomla!
Readme
# CVE-2019-15120
Exploit for XSS via BBCode on Kunena extension before 5.1.14 for Joomla!

# Information

Description: In Kunena extension before 5.1.14 for Joomla!, it’s possible for any user to execute a stored XSS attack by sending special message in any field with BBcode support. As a result, the vulnerability can easily leads to RCE.
Versions Affected: Kunena extension for Joomla! version 5.x through 5.1.14

Researcher: Andrey Skuratov (https://github.com/h3llraiser/)

Disclosure Link: https://www.kunena.org/blog/207-kunena-5-1-14-released

VEL Link: https://vel.joomla.org/resolved/2260-kunena-5-0-x-5-1-14-xss-cross-site-scripting

NIST CVE Link: https://nvd.nist.gov/vuln/detail/CVE-2019-15120

# POC

An example of vector:

```[spoiler="qwe<script>alert('PWNED!')</script>"]rty[/spoiler]```

# Screenshots:

![](POC_1_1.png)
![](POC_1_2.png)

# Stored XSS in Kunena extension before 5.1.14 for Joomla! to RCE video demonstration (BONUS)
[![rce](http://img.youtube.com/vi/xmEub6ZVUhI/0.jpg)](https://youtu.be/xmEub6ZVUhI)
File Snapshot

[4.0K] /data/pocs/c84a9f757f11676651941627f810286c4bc0a07e ├── [855K] POC_1_1.png ├── [682K] POC_1_2.png └── [1.0K] README.md 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.