Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Stored Cross Site Scripting Vulnerability on "Fields Configuration" in "Name" field in rukovoditel 3.2.1 #10

Closed
anhdq201 opened this issue Nov 2, 2022 · 1 comment

Comments

@anhdq201
Copy link
Owner

anhdq201 commented Nov 2, 2022

Version: 3.2.1

Description

An authenticated malicious user can take advantage of a Stored XSS vulnerability in "Name" field in the "Fields Configuration" feature.

Proof of Concept

Step 1: Go to "/index.php?module=entities/fields&entities_id=24", click "Add New Field" and insert payload "<img src=1 onerror='alert(document.cookie)'/>" in "Name" field.

image

Step 2: Alert XSS Message

image

Impact

If an attacker can control a script that is executed in the victim's browser, then they can typically fully compromise that user.

@anhdq201 anhdq201 changed the title Stored Cross Site Scripting Vulnerability on "Form Configuration" in rukovoditel 3.2.1 Stored Cross Site Scripting Vulnerability on "Fields Configuration" in rukovoditel 3.2.1 Nov 2, 2022
@anhdq201 anhdq201 changed the title Stored Cross Site Scripting Vulnerability on "Fields Configuration" in rukovoditel 3.2.1 Stored Cross Site Scripting Vulnerability on "Fields Configuration" in "Name" field in rukovoditel 3.2.1 Nov 2, 2022
@anhdq201
Copy link
Owner Author

anhdq201 commented Dec 9, 2022

CVE-2022-44950

@anhdq201 anhdq201 closed this as completed Dec 9, 2022
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant