Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <CALv8orHJWUHYVmSJ6KYKjhT_09_LFuYFtbdJj1gx87Gm0sp-+A@mail.gmail.com>
Date: Sun, 5 May 2019 15:37:08 +0530
From: Pramod Rana <varchashva@...il.com>
To: oss-security@...ts.openwall.com
Subject: Cross Site Scripting | WolfCMS v0.8.3.1 and before

Description: WolfCMS v0.8.3.1 and before is vulnerable to cross site
scripting in User Add module for parameter Name.

Impacted URL is http://[your_webserver_ip]/wolfcms/?/admin/user/add

Payload used is "TestXSS><img src=x onmousover=alert(document.cookie)>

Further details: https://github.com/wolfcms/wolfcms/issues/683

Already requested for CVE, yet to receive it.

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.