Webpagetest – Multiple Cross-Site Scripting (XSS) in “benchmarks/compare.php”
Product: webpagetest
Download: https://github.com/WPO-Foundation/webpagetest
Vunlerable Version: 3.0 and probably prior
Tested Version: 3.0
Author: ADLab of Venustech
Advisory Details:
Multiple Cross-Site Scripting (XSS) were discovered in“webpagetest 3.0”, which can be exploited to execute arbitrary code.
The vulnerabilities exist due to insufficient filtration of user-supplied data in the “configs” HTTP GET/POST parameter passed to the “webpagetest-master/www/benchmarks/compare.php” URL. An attacker could execute arbitrary HTML and script code in a browser in the context of the vulnerable website.
The exploitation examples below use the "alert()" JavaScript function to see a pop-up messagebox:
Poc:
(1) http://localhost/.../webpagetest-master/www/benchmarks/compare.php?configs=%22%3E%3Cscript%3Ealert(1);%3C/script%3E%3C%22
(2)
POST:
configs= ";}</script><script>alert(1);</script><script>function test(){//
TO http://localhost/.../webpagetest-master/www/benchmarks/compare.php
The text was updated successfully, but these errors were encountered:
Webpagetest – Multiple Cross-Site Scripting (XSS) in “benchmarks/compare.php”
Product: webpagetest
Download: https://github.com/WPO-Foundation/webpagetest
Vunlerable Version: 3.0 and probably prior
Tested Version: 3.0
Author: ADLab of Venustech
Advisory Details:
Multiple Cross-Site Scripting (XSS) were discovered in“webpagetest 3.0”, which can be exploited to execute arbitrary code.
The vulnerabilities exist due to insufficient filtration of user-supplied data in the “configs” HTTP GET/POST parameter passed to the “webpagetest-master/www/benchmarks/compare.php” URL. An attacker could execute arbitrary HTML and script code in a browser in the context of the vulnerable website.
The exploitation examples below use the "alert()" JavaScript function to see a pop-up messagebox:
Poc:
(1)
http://localhost/.../webpagetest-master/www/benchmarks/compare.php?configs=%22%3E%3Cscript%3Ealert(1);%3C/script%3E%3C%22
(2)
POST:
configs= ";}</script><script>alert(1);</script><script>function test(){//
TO
http://localhost/.../webpagetest-master/www/benchmarks/compare.php
The text was updated successfully, but these errors were encountered: