Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Reflected XSS vulnerability in wcms/wcms/wex/cssjs.php #9

Open
nenf opened this issue Jul 20, 2020 · 0 comments
Open

Reflected XSS vulnerability in wcms/wcms/wex/cssjs.php #9

nenf opened this issue Jul 20, 2020 · 0 comments

Comments

@nenf
Copy link

@nenf nenf commented Jul 20, 2020

Hi, dev team!

There is Reflected XSS vulnerability in wcms/wcms/wex/cssjs.php file.

The vulnerable code is:

64: type='<?php echo $_GET['type'];?>'>

Example POC: Just send any js code in type parameter like: type=<script>alert()</script>

Reflected cross-site scripting (or XSS) arises when an application receives data in an HTTP request and includes that data within the immediate response in an unsafe way. If an attacker can control a script that is executed in the victim's browser, then they can typically fully compromise that user.

To prevent xss use next manual: https://portswigger.net/web-security/cross-site-scripting/preventing.

Please let me know about any fixes, I would like to register CVE number.

@nenf nenf changed the title Reflected XSS vulnerability Reflected XSS vulnerability in wcms/wcms/wex/cssjs.php Jul 20, 2020
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Linked pull requests

Successfully merging a pull request may close this issue.

None yet
1 participant