You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
StrongShop v1.0 has a Reflective Cross-Site Scripting (XSS) vulnerability located in the file resources/views/admin/product/spec/index.blade.php.
Details
The vulnerability is located in the script tag. The application does not escape the user-supplied spec_group_id parameter before including it in the HTML output, leading to a reflective XSS vulnerability.
var spec_group_id = '{!!request('spec_group_id')!!}';
var tableConfig = {
cols: [cols]
,where:{spec_group_id:spec_group_id}
};
Util.renderTable(tableConfig);
}();
</script>
Summary
StrongShop v1.0 has a Reflective Cross-Site Scripting (XSS) vulnerability located in the file
resources/views/admin/product/spec/index.blade.php
.Details
The vulnerability is located in the script tag. The application does not escape the user-supplied
spec_group_id
parameter before including it in the HTML output, leading to a reflective XSS vulnerability.Proof of Concept (PoC)
http://192.168.0.10:1019/admin/product/spec/index?spec_group_id='%3C/script%3E%3Csvg%20onload=alert(1)%3E%3Cscript%3E
![image](https://private-user-images.githubusercontent.com/66168888/335023974-5b3175a4-7efa-4d29-ab66-3e57fcbe4d7f.png?jwt=eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJpc3MiOiJnaXRodWIuY29tIiwiYXVkIjoicmF3LmdpdGh1YnVzZXJjb250ZW50LmNvbSIsImtleSI6ImtleTUiLCJleHAiOjE3MjMwNjAzOTgsIm5iZiI6MTcyMzA2MDA5OCwicGF0aCI6Ii82NjE2ODg4OC8zMzUwMjM5NzQtNWIzMTc1YTQtN2VmYS00ZDI5LWFiNjYtM2U1N2ZjYmU0ZDdmLnBuZz9YLUFtei1BbGdvcml0aG09QVdTNC1ITUFDLVNIQTI1NiZYLUFtei1DcmVkZW50aWFsPUFLSUFWQ09EWUxTQTUzUFFLNFpBJTJGMjAyNDA4MDclMkZ1cy1lYXN0LTElMkZzMyUyRmF3czRfcmVxdWVzdCZYLUFtei1EYXRlPTIwMjQwODA3VDE5NDgxOFomWC1BbXotRXhwaXJlcz0zMDAmWC1BbXotU2lnbmF0dXJlPTY4OTNjNGQ5ODQyNTI4YzJlYmI3OTljZDAwNTg0MDhkYmY3NjUyM2YzODhiMTRmOGQ0Y2MxNzkxMzAyZGYwNzAmWC1BbXotU2lnbmVkSGVhZGVycz1ob3N0JmFjdG9yX2lkPTAma2V5X2lkPTAmcmVwb19pZD0wIn0.ow30Tiw-j_cUtFXd2Acb636bQ0aPV4LZdmIUvNe7Rks)
The text was updated successfully, but these errors were encountered: