Share
## https://sploitus.com/exploit?id=ZSL-2025-5917
<html><body><p>CMU CERT/CC VINCE v2.0.6 Stored XSS


Vendor: Carnegie Mellon University
Product web page: https://www.kb.cert.org/vince/
Affected version: &lt;=2.0.6

Summary: VINCE is the Vulnerability Information and Coordination
Environment developed and used by the CERT Coordination Center
to improve coordinated vulnerability disclosure. VINCE is a
Python-based web platform.

Desc: The framework suffers from an authenticated stored
cross-site scripting vulnerability. Input passed to the
'content' POST parameter is not properly sanitised before
being returned to the user. This can be exploited to execute
arbitrary HTML/JS code in a user's browser session in context
of an affected site.

Tested on: nginx/1.20.0
           Django 3.2.17


Vulnerability discovered by Gjoko 'LiquidWorm' Krstic
                            @zeroscience


Advisory ID: ZSL-2025-5917
Advisory URL: https://www.zeroscience.mk/en/vulnerabilities/ZSL-2025-5917.php


13.01.2023

--


$ curl -k https://kb.cert.org/vince/comm/post/CASE_NO \
&gt; -H "Cookie: sessionid=xxxx" \
&gt; -d 'content="&gt;<marquee>ZSL</marquee>%0A%0A&amp;csrfmiddlewaretoken=xxx&amp;paginate_by=10&amp;reply_to=xxxxx'
</p></body></html>