Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Reflected XSS Vulnerability in Xinhu RockOA v2.6.3 #7

Open
Hebing123 opened this issue Jul 11, 2024 · 0 comments
Open

Reflected XSS Vulnerability in Xinhu RockOA v2.6.3 #7

Hebing123 opened this issue Jul 11, 2024 · 0 comments

Comments

@Hebing123
Copy link

Hebing123 commented Jul 11, 2024

Summary

A Reflected Cross-Site Scripting (XSS) vulnerability has been identified in Xinhu RockOA v2.6.3, existing in the Callback parameter of /webmain/public/upload/tpl_upload.html.

Details

In /webmain/public/upload/tpl_upload.html, since the callback variable is directly concatenated into the script tag without filtering, an attacker can execute malicious JS through the callback parameter.
image
As shown in the figure, the attacker successfully closed the previously mentioned okla:function() and var up={} as well as the subsequently mentioned closeaa:function() through a carefully crafted input, allowing it to run normally within the script tag.
image

Proof of Concept (PoC)

http://your-ip/index.php?m=upload&d=public&callback=callback%20=callback;%20if%20(showid%20!=%20264569789)%20{%20alert(250);%20}%20}%20catch%20(e)%20{}%20;this.closeaa()},};alert(document.cookie);var%20test={okla:function(){if%20(showid!=10){//

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant