Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Authenticated Stored Cross Site Scripting Vulnerability #427

Open
c0d3G33k opened this issue Jan 23, 2018 · 0 comments
Open

Authenticated Stored Cross Site Scripting Vulnerability #427

c0d3G33k opened this issue Jan 23, 2018 · 0 comments

Comments

@c0d3G33k
Copy link

c0d3G33k commented Jan 23, 2018

Hi, I have found a stored XSS vulnerability.

Affected Version:
3.0.4 or before

Affected URL:
http://<your_site>/monstra/<page_name.php>

Payload

"><img src=x onerror=prompt(1)>

Steps to replicate:

  1. Goto http://127.0.0.1/monstra/admin/index.php?id=pages
  2. Create a new page
  3. Navigate to title section
  4. Enter payload as shown in above section
  5. Visit http://<your_site>/monstra/<page_name.php>.php
  6. You will triage JavaScript execution

Impacts:

A user with editor level privileges can make JavaScript code execution in admin's session.

Testing Environment:

  1. Server: Apache 2.4.2
  2. PHP : 7.1.8

Mitigation:
Pass user input from below mentioned function

function test_input($data) {
  $data = trim($data);
  $data = stripslashes($data);
  $data = htmlspecialchars($data);
  return $data;
}
@c0d3G33k c0d3G33k changed the title Stored Cross Site Scripting Vulnerability Authenticated Stored Cross Site Scripting Vulnerability Jan 23, 2018
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant