<script>alert("xss")</script> The value of the "type" param...">Reflected XSS on /editor_tools/module - vulnerability database | Vulners.com<script>alert("xss")</script> The value of the "type" param..."><script>alert("xss")</script> The value of the "type" param..."><script>alert("xss")</script> The value of the "type" param...">
Lucene search

K
huntrJhond0e0142970A-5CB8-4DBA-8BBC-4FA2F3BEE65C
HistoryJun 17, 2022 - 11:58 a.m.

Reflected XSS on /editor_tools/module

2022-06-1711:58:21
jhond0e
www.huntr.dev
4

6.1 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:L

4.3 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

0.001 Low

EPSS

Percentile

31.9%

Description

Reflected XSS with filter bypass on /editor_tools/module using type= parameter.

Proof of Concept

https://demo.microweber.org/demo/editor_tools/module?type="&gt;</div>&lt;script&gt;alert("xss")&lt;/script&gt;

The value of the “type” parameter is injected into the source code of the page at line 38. Since the value of the “type” parameter is not sanitized, it is possible to close the div tag with ’ "></div> ’ and then put javascript code.

6.1 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:L

4.3 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

0.001 Low

EPSS

Percentile

31.9%

Related for 0142970A-5CB8-4DBA-8BBC-4FA2F3BEE65C