Hello:
I have find a Reflected XSS vulnerability in this project.
The vulnerability exists due to insufficient filtration of user-supplied data in "step" HTTP parameter that will be passed to "MaNGOSWebV4-master/install/index.php". The infected source code is line 35, there is no protection on $_GET['step']; if $_GET['step'] contains evil js code, line 41 will trigger untrusted code to be excuted on the browser side.
So if a attacker construct a special url as follow and send it to a victim, when the victim click the url, the code which is contained in the url will be executed on the victim's browser side to do some evil. http://your-web-root/MaNGOSWebV4-master/install/index.php?step=><script>alert(1);</script><
The follow scrrenshot is the result to click the upper url ( win7 spq x64 + firefox 51.0.1 32bit )
Discoverer: ADLab of Venustech
The text was updated successfully, but these errors were encountered:
Hello:
I have find a Reflected XSS vulnerability in this project.
The vulnerability exists due to insufficient filtration of user-supplied data in "step" HTTP parameter that will be passed to "MaNGOSWebV4-master/install/index.php". The infected source code is line 35, there is no protection on $_GET['step']; if $_GET['step'] contains evil js code, line 41 will trigger untrusted code to be excuted on the browser side.

So if a attacker construct a special url as follow and send it to a victim, when the victim click the url, the code which is contained in the url will be executed on the victim's browser side to do some evil.
http://your-web-root/MaNGOSWebV4-master/install/index.php?step=><script>alert(1);</script><
The follow scrrenshot is the result to click the upper url ( win7 spq x64 + firefox 51.0.1 32bit )

Discoverer: ADLab of Venustech
The text was updated successfully, but these errors were encountered: