Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Stored XSS In Funboot V1.1 #2

Open
QDming opened this issue Mar 8, 2024 · 0 comments
Open

Stored XSS In Funboot V1.1 #2

QDming opened this issue Mar 8, 2024 · 0 comments

Comments

@QDming
Copy link

QDming commented Mar 8, 2024

Vulnerability Product:funboot
Vulnerability version: v1.1
Vulnerability type: Stored XSS
Vulnerability Details:

<script>alert(document.cookie)</script>

the Stored XSS payload could let admin causes disclosure of cookies、root path of websites、variables of PHP and stuff

  1. First, log in: https://www.funboot.net/backend/site/login
    Default account: test
    Default password: 123456
    image

  2. After logging in, create a message here in the message list
    image

  3. When creating a message, users, titles, and content can be selected

It is found that the title can construct malicious code storage type XSS to obtain user information and access it through the network
image

  1. Clicking on 'sent' will reveal the pop-up cookie information
    image

Prove the existence of stored xss

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant