Store XSS in module name "admin/controllers/edit/comments/comments_list" in instantsoft/icms2
Reported on
Aug 8th 2023
Description
I noticed that you filtered the comment very carefully.
But there are still some parts you missed
Proof of Concept
1.Login with admin
2.go to "https://demo.instantcms.io/admin/controllers/edit/comments/comments_list"
3.Select 1 comment and insert payload
<image src=1 href=1 onerror="alert(document.cookie)"></image>
4.Click save , and store xss happened
5.Then, login another admin account, go to comments, detect store xss
Video PoC
https://drive.google.com/file/d/12s7byrrIusDs4npsSosusb-WXoPGUrc-/view?usp=drive_link
Impact
This security vulnerability has the potential to steal multiple users' cookies, gain unauthorized access to that user's account through stolen cookies, or redirect the user to other malicious websites...
Yes, this is confirmed and needs to be corrected. But you should realize that this is an admin panel, and if an attacker gets there, he can do anything without any XSS :) But thanks anyway, we confirm it, we'll fix it, and we'll write about the solution here.
This is a problem in the third-party editor used in InstantCMS