Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Reflected cross site scripting found (XSS) #29

Open
riteshgupta1993 opened this Issue Aug 15, 2018 · 1 comment

Comments

Projects
None yet
2 participants
@riteshgupta1993
Copy link

riteshgupta1993 commented Aug 15, 2018

• Fiendura version: 2.0.7
• PHP Version: 5.6.35
• Apache Version: 2.4.33
• Operating system: microsoft windows v10

VULNERABILITY TYPE: cross-site scripting.

Cross-Site Scripting (XSS) attacks are a type of injection, in which malicious scripts are injected into otherwise benign and trusted websites. XSS attacks occur when an attacker uses a web application to send malicious code, generally in the form of a browser side script, to a different end user. Flaws that allow these attacks to succeed are quite widespread and occur anywhere a web application uses input from a user within the output it generates without validating or encoding it.

An attacker can use XSS to send a malicious script to an unsuspecting user. The end user's browser has no way to know that the script should not be trusted, and will execute the script. Because it thinks the script came from a trusted source; the malicious script can access any cookies, session tokens, or other sensitive information retained by the browser and used with that site. These scripts can even rewrite the content of the HTML page.

STEPS TO REPRODUCE:

1: login in Fiendura.
2: Go for creating a new page by clicking on the new page.
3: In the tags parameter, type the malicious javascript /default.aspx#"><img src=x onerror=prompt('0');>
4: The malicious javascript will be reflected in the browser.

PROOF OF CONCEPT:

Vulnerable URL: http://127.0.0.16/index.php?category=0&page=new
Vulnerable parameter: Tags
Malicious script: /default.aspx#"><img src=x onerror=prompt('0');>

1: enter the malicious javascript in the Tags parameter.
new11

2: after entering the payload an XSS prompt will be reflected on the browser.
new12
Submitted: Ritesh Kumar
Reference: https://www.owasp.org/index.php/Crosssite_Scripting_(XSS)

@Halamadrid777

This comment has been minimized.

Copy link

Halamadrid777 commented Mar 12, 2019

Great find

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
You can’t perform that action at this time.