Lucene search

K
huntrScgajge1218A74A9D-4A2D-4BF8-AE62-56A909427070
HistoryJun 28, 2023 - 3:50 a.m.

Stored XSS in Title

2023-06-2803:50:56
scgajge12
www.huntr.dev
4
xss
stored
spina
admin
javascript
arbitrary
execution
browser
proof of concept
payload
parameter
privilege
attack
video

0.001 Low

EPSS

Percentile

23.3%

Description

Spina’s admin screen has an embedded XSS in the title of the page.

By embedding arbitrary JavaScript code in the function of Paguri, arbitrary scripts can be executed on the browser when the administrator user who accessed the page deletes the page.

Proof of Concept

Step 1. Access the admin screen and open a new page.
Step 2. Specify the following Payload in the title of the page and save it.
Step 3. Any embedded script (alert) will be executed on the confirmation screen when deleting a saved page.

Payload

'"&gt;<img src>

Parameter

page[en_content_attributes][0][title]

Privilege required for attack

Users who can log in to the administrator screen and edit pages

PoC Video

https://drive.google.com/file/d/1daQkxox9Y_U4pveMv24daeWUfA9u_vte/view?usp=sharing

0.001 Low

EPSS

Percentile

23.3%

Related for 18A74A9D-4A2D-4BF8-AE62-56A909427070