dotcms 20.11 stored crosssite scripting
▸▸▸ Exploit & Vulnerability >> webapps exploit & multiple vulnerability
# Exploit Title: DotCMS 20.11 - Stored Cross-Site Scripting # Exploit Author: Hardik Solanki # Vendor Homepage: https://dotcms.com/ # Version: 20.11 # Tested on Windows 10 Vulnerable Parameters: Template Title Steps to reproduce: 1. Login With Admin Username and password. 2. Navigate to Site --> Template --> Add Template Designer 2. Entre the payload <script>alert(document.cookie)</script> in Template Title. 3. Now Navigate to Site --> Template. We could see that our payload gets executed. And hence it executed every time.
Dotcms 20.11 stored crosssite scripting Vulnerability / Exploit Source : Dotcms 20.11 stored crosssite scripting