# Exploit Title: ProActive CMS Multiple Vulnerabilities
# Google Dork: intext:"Powered by Proactive CMS"
# Exploit Author: Rafay Baloch
# Vendor Homepage: http://www.proactivecms.com
# Tested on: Linux
Stored Cross Site Scripting:
http://professional.inbusiness.com.au/admin.php?action=newuser
Insert Your Payload:
">
The newuser field does not properly sanitize the input, resulting in a
Stored
XSS.
An Open redirect issue also found:
POC:
http://professional.inbusiness.com.au/admin.php?action=http://rafayhackingarticles.net
Just, replace http://rafayhackingarticles.net with your own domain.
Missing CSRF Tokens:
Most of the forms are missing with CSRF tokens, To be honest one of the
most insecure
cms i have ever seen.
http://professional.inbusiness.com.au/admin.php?action=edituser&id=24
The following POC, could be altered to use it to alter a user's detail.