You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
We found multiple XSS vulnerabilities in the latest version of Ecommerce-CodeIgniter-Bootstrap.
Technique details:
The vulnerabilities occur at base_url() function. We notice the user inputs (e.g., $_POST) are used as the parameter of base_url() function in many places (e.g., the 45th line in /application/modules/admin/views/blog/blogpublish.php), the program echo the return value of this function directly without proper sanitization. This would lead to XSS vulnerabilities.
Example:
We exploit the echo function in /application/modules/admin/views/blog/blogpublish.php#45 line.
The attacker can set $_POST['img'] to 'q" onerror="javascript:alert(1)'. Then the img tag becomes
Then he successfully performs a XSS attack.
The vulnerability has been fixed in 56465f after we reported it to developers.
The text was updated successfully, but these errors were encountered:
We found multiple XSS vulnerabilities in the latest version of Ecommerce-CodeIgniter-Bootstrap.
Technique details:
The vulnerabilities occur at base_url() function. We notice the user inputs (e.g., $_POST) are used as the parameter of base_url() function in many places (e.g., the 45th line in /application/modules/admin/views/blog/blogpublish.php), the program echo the return value of this function directly without proper sanitization. This would lead to XSS vulnerabilities.
Example:
We exploit the echo function in /application/modules/admin/views/blog/blogpublish.php#45 line.
The attacker can set $_POST['img'] to 'q" onerror="javascript:alert(1)'. Then the img tag becomes
Then he successfully performs a XSS attack.
The vulnerability has been fixed in 56465f after we reported it to developers.
The text was updated successfully, but these errors were encountered: