Product: pi-engine/pi
Download: https://github.com/pi-engine/pi
Vunlerable Version: 2.5.0 and probably prior
Tested Version: 2.5.0
Author: ADLab of Venustech
Advisory Details:
A Cross-Site Scripting (XSS) was discovered in “pi-engine/pi 2.5.0”, which can be exploited to execute arbitrary code.
The vulnerability exists due to insufficient filtration of user-supplied data in the “preview” HTTP POST parameter passed to the the “pi-develop/www/script/editor/markitup/preview/markdown.php” URL. An attacker could execute arbitrary HTML and script code in a browser in the context of the vulnerable website.
The exploitation example below uses the "alert()" JavaScript function to see a pop-up messagebox:
Poc:
Post: preview=><script>alert(1);</script><
To http://localhost/.../pi-develop/www/script/editor/markitup/preview/markdown.php
The text was updated successfully, but these errors were encountered:
Product: pi-engine/pi
Download: https://github.com/pi-engine/pi
Vunlerable Version: 2.5.0 and probably prior
Tested Version: 2.5.0
Author: ADLab of Venustech
Advisory Details:
A Cross-Site Scripting (XSS) was discovered in “pi-engine/pi 2.5.0”, which can be exploited to execute arbitrary code.
The vulnerability exists due to insufficient filtration of user-supplied data in the “preview” HTTP POST parameter passed to the the “pi-develop/www/script/editor/markitup/preview/markdown.php” URL. An attacker could execute arbitrary HTML and script code in a browser in the context of the vulnerable website.
The exploitation example below uses the "alert()" JavaScript function to see a pop-up messagebox:
Poc:
Post: preview=><script>alert(1);</script><
To
http://localhost/.../pi-develop/www/script/editor/markitup/preview/markdown.php
The text was updated successfully, but these errors were encountered: