Backdrop CMS version 1.23.0 was discovered to contain a stored cross-site scripting (XSS) vulnerability via the Comment
.
The attacker must post something on the "comment" and insert the XSS payload at the "comment" input, and pick the Raw HTML Editor in order to exploit the stored XSS. The XSS payload will be launched immediately after save.
-
http://ip_address/backdrop/comment/reply/id_reply
-
POST /backdrop/comment/reply/id_reply
<img src=x onerror=confirm('Grim-The-Ripper-Team-by-SOSECURE-Thailand')>
-
Backdrop CMS version 1.23.0 (https://github.com/backdrop/backdrop/releases/tag/1.23.0)
-
Firefox version 105
- Enter your username and password; the account must have admin privileges.
- Select some post at the main website.
- Enter information into the form provided.
- Enter the XSS payload in the comment field.
- Choose "Raw HTML" Editor and Save.
- The XSS payload will run immediately.
Grim The Ripper Team by SOSECURE Thailand
- 2022–09–27: Vulnerability discovered.
- 2022–09–27: Vulnerability reported to the MITRE corporation.
- 2022–10–15: CVE has been reserved.
- 2022–10–31: Public disclosure of the vulnerability.
Reference: