CVE-2020-24860

CMS Made Simple 2.2.14 allows an authenticated user with access to the Content Manager to edit content and put persistent XSS payload in the affected text fields. The user can get cookies from every authenticated user who visits the website.
Configurations

Configuration 1 (hide)

cpe:2.3:a:cmsmadesimple:cms_made_simple:2.2.14:*:*:*:*:*:*:*

History

21 Nov 2024, 05:16

Type Values Removed Values Added
References () http://packetstormsecurity.com/files/159434/CMS-Made-Simple-2.2.14-Cross-Site-Scripting.html - Exploit, Third Party Advisory, VDB Entry () http://packetstormsecurity.com/files/159434/CMS-Made-Simple-2.2.14-Cross-Site-Scripting.html - Exploit, Third Party Advisory, VDB Entry
References () https://www.cmsmadesimple.org - Product () https://www.cmsmadesimple.org - Product
References () https://www.exploit-db.com/exploits/48851 - Exploit, Third Party Advisory, VDB Entry () https://www.exploit-db.com/exploits/48851 - Exploit, Third Party Advisory, VDB Entry
References () https://www.youtube.com/watch?v=M6D7DmmjLak&t=22s - Exploit, Third Party Advisory () https://www.youtube.com/watch?v=M6D7DmmjLak&t=22s - Exploit, Third Party Advisory

Information

Published : 2020-10-01 14:15

Updated : 2024-11-21 05:16


NVD link : CVE-2020-24860

Mitre link : CVE-2020-24860

CVE.ORG link : CVE-2020-24860


JSON object : View

Products Affected

cmsmadesimple

  • cms_made_simple
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')