Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Admin Member JSON Update Store XSS vulnerable #845

Closed
hacker625 opened this issue Sep 20, 2019 · 1 comment · Fixed by #859
Closed

Admin Member JSON Update Store XSS vulnerable #845

hacker625 opened this issue Sep 20, 2019 · 1 comment · Fixed by #859
Assignees
Milestone

Comments

@hacker625
Copy link

Test it on version 4.2.1.

First login the panel with user credential, Go to member tag from left menu.

http://localhost/panel/members/

Username, Full Name, Email are editable with double click on it. Insert the following payload

<img src=x onerror=alert(document.cookie)>

Xss alert are trigger.

Poc
subrion

Note. Script tag are filter in the input field. it is work at username
<img src="//www.gravatar.com/avatar/1667c96fb90d94769e72069d6cad71b6?s=100&amp;d=mm&amp;r=g" alt="<script>alert(1);</script>">

Poc 2
subrion2

Please fix and filter all input tag.
Thank you.

@vbezruchkin
Copy link
Member

Hi,

Can you explain what benefit it would be, if you already have admin access? Frontend input is properly sanitized, so why would admin need to use that line for user? I don't quite understand the idea.

Thanks

@4unkur 4unkur self-assigned this Feb 26, 2020
4unkur added a commit that referenced this issue Feb 27, 2020
@4unkur 4unkur added this to the 4.2.2 milestone Feb 28, 2020
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
3 participants