About Us Contact Us
Home About Services Solutions Industries Knowledge Blog Contact
Hit enter to search

XSS Vulnerabilities on Monstra CMS 3.0.4.


This article is about the XSS vulnerabilities that we had found out on Monstra CMS 3.0.4.

The bugs had a medium effect, and they were also easy to find and replicate.

Now coming to XSS,

Cross-Site Scripting (XSS) attacks are a form of scripting that injects malicious scripts into otherwise benign and trusted websites, according to the internet. XSS attacks occur when a web application is used by an attacker to send malicious code to a specific end user, typically in the form of a browser side script. Flaws that enable these attacks to succeed are widespread and occur wherever a web application uses a user's input within the output it generates without validating or encoding it.

An attacker may use XSS to give an unsuspecting user a malicious script. The client of the end user has no way of knowing that the script should not be trusted and that the script will be executed. Because it thinks the script comes from a trusted source; any cookies, session tokens, or other sensitive information retained by the browser and used with that site can be accessed by the malicious script. Such scripts can also rewrite the HTML page text.

I will give a detailed explanation on XSS in the coming days that will be placed on the articles tab.


Vulnerability Type : Cross Site Scripting (XSS)

Vendor of Product : Monstra CMS 3.0.4

Affected Component : http://localhost/monstra/admin/index.php?id=pages

Attack Type : Remote

Attack Vectors:

  • Steps:
    1. go to the following link http://localhost/monstra/admin/index.php?id=pages
    2. enter username and password
    3. capture the post request in burpsuite
    4. Forward the request and turn off the intercept in burpsuite
    5. You will get a pop up in browser


POST /monstra/admin/index.php?id=pages HTTP/1.1
Host: localhost
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:52.0) Gecko/20100101 Firefox/52.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,/;q=0.8
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
Referer: http://localhost/monstra/admin/index.php?id=pages
Connection: close
Upgrade-Insecure-Requests: 1
Content-Type: application/x-www-form-urlencoded
Content-Length: 71

Vulnerability Type : Cross Site Scripting (XSS)
Vendor of Product : Monstra CMS 3.0.4
Affected Component : http://localhost/monstra/users/registration
Attack Type : Remote
Attack Vectors:

  • Steps:
    1. While registering..enter your details
    2. turn up the intercept in burp
    3. Capture the request and change any field(endpoint) in post request body to a malicious code
    4. Make a csrf poc of that send it to the victim
    5. The malicious script will executed on the victim’s end

POST /monstra/users/registration HTTP/1.1
Host: localhost
Cache-Control: no-cache
Referer: http://localhost/monstra/users/registration
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,/;q=0.5
User-Agent: Mozilla/5.0 (Windows NT 6.3; WOW64) AppleWebKit/537.36 (KHTML, like Gecko)
Chrome/41.0.2272.16 Safari/537.36
Accept-Language: en-us,en;q=0.5
Cookie: PHPSESSID=xxxx; login_attempts=i%3A5%3B
Accept-Encoding: gzip, deflate
Content-Length: 142
Content-Type: application/x-www-form-urlencoded
External Links:





  • 23/05/18 :- Tried to contact Monstra CMS,but got no reply
  • 25/05/18 :- Went to cve mitre and requested for a CVE ID.
  • 25/05/18 :- Cve request Ids were generated and was asked for a public disclosure of the POC
  • 26/05/18 :- Provided the public disclosure(my github repos where I had made poc of the bugs)
  • 27/05/18 :- CVE ID and Issue was made public by cve mitre.

So that’s for now. See you next time.