Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

4images v1.8 - 'Admin panel login' Cross-Site Scripting #3

Closed
xoffense opened this issue Feb 13, 2021 · 1 comment
Closed

4images v1.8 - 'Admin panel login' Cross-Site Scripting #3

xoffense opened this issue Feb 13, 2021 · 1 comment

Comments

@xoffense
Copy link

xoffense commented Feb 13, 2021

Vulnerable parameter: redirect

XSS sample Payload: '"()%26%25<ScRiPt%20>alert(document.cookie)</ScRiPt>

Steps to reproduce the vulnerability(POC):
1- Goto 4images admin panel page (demo instance:https://localhost/4images/admin/index.php)
2- Enter the credentials , Turn on the intercept and click on "Login"
3- copy paste the XSS payload after redirect=./../admin/index.php%3Fsessionid=xxxxxPASTEPAYLOADHERE
4-Forward the request and you can see XSS is triggered.

Video POC: https://drive.google.com/file/d/12T39ZCqpbdz29gKptIdPnNHy1Nudr9Cs/view?usp=sharing

Impact:
With the help of xss attacker can perform social engineering on users by redirecting them from a real website to a fake ones. Attacker can steal their cookies leading to account takeover and download malware on their system, and there are many more attacking scenarios a skilled attacker can perform with XSS.

@esginmurat
Copy link

Thank you @xoffense

Ok. So, is there a patch for training now? regards..

Vulnerable parameter: redirect

XSS sample Payload: '"()%26%25<ScRiPt%20>alert(document.cookie)</ScRiPt>

Steps to reproduce the vulnerability(POC): 1- Goto 4images admin panel page (demo instance:https://localhost/4images/admin/index.php) 2- Enter the credentials , Turn on the intercept and click on "Login" 3- copy paste the XSS payload after redirect=./../admin/index.php%3Fsessionid=xxxxxPASTEPAYLOADHERE 4-Forward the request and you can see XSS is triggered.

Video POC: https://drive.google.com/file/d/12T39ZCqpbdz29gKptIdPnNHy1Nudr9Cs/view?usp=sharing

Impact: With the help of xss attacker can perform social engineering on users by redirecting them from a real website to a fake ones. Attacker can steal their cookies leading to account takeover and download malware on their system, and there are many more attacking scenarios a skilled attacker can perform with XSS.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants