Tendoo CMS 1.3 - Cross-Site Scripting

Author: Arash Khazaei
type: webapps
platform: php
port: 80.0
date_added: 2015-07-29  
date_updated: 2015-07-29  
verified: 1  
codes: OSVDB-125530  
tags:   
aliases:   
screenshot_url: http://www.exploit-db.com/screenshots/idlt38000/tendooxss.png  
application_url: http://www.exploit-db.comTendoo_1.3.tar.gz  

raw file: 37715.txt  
# Exploit Title: Tendoo CMS Stored And Reflected Xss Vulnerability
# Google Dork: N/A
# Date: 28/7/2015
# Exploit Author: Arash Khazaei
# Vendor Homepage: http://tendoo.org/
# Software Link: http://sourceforge.net/projects/tendoo-cms/
# Version: 1.3
# Tested on: Kali , Windows
# CVE : N/A
# Contact : 0xclay@gmail.com

######################
Introduction :
a Stored And a Reflected XSS Vulnerability In Profile Area In Tendoo CMS
Make CMS Vulnerable And Can Be Used For Stealing Admin Cookies And ....... .
######################

Stored Xss In http://localhost/tendoo/index.php/account/update In First
Name and Last Name Inputs
Excute Java Script Codes And If Admin Or Any Body Come In Attacker Profile
When First Name And Last Name Loads
JavaScripts Code Will Be Excuted
POC :

https://i.leetfil.es/e992ad2d.jpg

Discovered By Arash Khazaei