{"hackerone": [{"lastseen": "2023-09-25T18:52:29", "bounty": 0.0, "description": "From @l4stb1t orginal report:\n\nThere are multiple XSS vulnerabilities on the default layerstyles provided by the adserver.\n\nFor the \"simple\" layer style (source code at \"plugins_repo/openXInvocationTags/plugins/invocationTags/oxInvocationTags/layerstyles/simple/layerstyle.inc.php\"):\n - CSS code injection on the \"padding\" parameter\n - CSS code injection on the \"bordercolor\" parameter\n - JavaScript code injection on the \"shifth\" parameter when the \"align\" parameter is set to \"center\"\n - JavaScript code injection on the \"shiftv\" parameter when the \"valign\" parameter is set to \"middle\"\n\nFor the \"geocities\" layer style (source code at plugins_repo/openXInvocationTags/plugins/invocationTags/oxInvocationTags/layerstyles/geocities/layerstyle.inc.php\"):\n - CSS code injection on the \"padding\" parameter\n - HTML code injection on the \"closetext\" parameter\n\nFor the \"floater\" layer style (source code at plugins_repo/openXInvocationTags/plugins/invocationTags/oxInvocationTags/layerstyles/floater/layerstyle.inc.php\"):\n - JavaScript code injection on the \"rmargin\" parameter\n - JavaScript code injection on the \"lmargin\" parameter\n - CSS code injection on the \"shiftv\" parameter\n - JavaScript code injection on the \"loop\" parameter\n\nFor the \"cursor\" layer style (source code at plugins_repo/openXInvocationTags/plugins/invocationTags/oxInvocationTags/layerstyles/cursor/layerstyle.inc.php\"):\n - JavaScript code injection on the \"stickyness\" parameter when the \"trail\" parameter is set to \"1\"\n - JavaScript code injection on the \"offsetx\" parameter when the \"trail\" parameter is set to \"1\"\n - JavaScript code injection on the \"offsety\" parameter when the \"trail\" parameter is set to \"1\"\n - JavaScript code injection on the \"transparancy\"\n - JavaScript code injection on the \"delay\" parameter when the \"hide\" parameter is set to \"1\"\n\nThe vulnerabilities may also affect other layerstyles copied from the ones listed above.\nThrough the CSS code injection an attacker may create request to external resources by suppling \"0;background:url(<link here>);\", while through the HTML and JavaScript code injection the attacker may run JavaScript code on the host website. \n\nExample exploitation:\nAssuming that the adserver runs under ads.example.com, and the zoneid 1 is a valid id of an active campaign, an attacker may conduct the following request from the server:\nhttps://ads.example.com/www/delivery/al.php?zoneid=1&layerstyle=geocities&closetext=%3Cscript%3Ealert(123);%3C/script%3E\nand the server will return JavaScript code with the attacker's payload as delivered by the closetext parameter.\n\n## Impact\n\nSince the endpoints return JavaScript code, benefit from the exploitation of the vulnerability the attacker has to chain it along with a specific behavior on the host site (the site showing the ads) allowing him to alter the parameters passed to the adserver. For example, if the host site forwards a client identifier from its parameters to the parameters of the adserver (e.g. passing a kid=XYZ), an attacker may use this to smuggle extra parameters to the adserver and eventually run JavaScript code or make external requests.\n\nThis method could also be used by an attacker to bypass Cross-Origin Resource Sharing (CORS) rules assuming that the adserver is whitelisted.\n\nThus, the impact of this vulnerability is relatively small.", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "attackComplexity": "LOW", "scope": "CHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "baseScore": 6.1, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 2.7}, "published": "2022-09-07T21:32:37", "type": "hackerone", "title": "Revive Adserver: Multiple cross-site scripting (XSS) vulnerabilities in Revive Adserver", "bulletinFamily": "bugbounty", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 5.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 4.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2023-38040"], "modified": "2023-09-13T12:17:54", "id": "H1:1694171", "href": "https://hackerone.com/reports/1694171", "cvss": {"score": 5.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:N"}}]}