DotCMS 20.11 - Stored Cross-Site Scripting
Author: Hardik Solanki
type: webapps
platform: multiple
port:
date_added: 2020-12-02
date_updated: 2020-12-02
verified: 0
codes:
tags:
aliases:
screenshot_url:
application_url:
# Exploit Title: DotCMS 20.11 - Stored Cross-Site Scripting
# Exploit Author: Hardik Solanki
# Vendor Homepage: https://dotcms.com/
# Version: 20.11
# Tested on Windows 10
Vulnerable Parameters: Template Title
Steps to reproduce:
1. Login With Admin Username and password.
2. Navigate to Site --> Template --> Add Template Designer
2. Entre the payload <script>alert(document.cookie)</script> in Template
Title.
3. Now Navigate to Site --> Template. We could see that our payload gets
executed. And hence it executed every time.