Lucene search

K
huntrCrowdoverflow3C070828-FD00-476C-BE33-9C877172363D
HistoryMar 06, 2022 - 4:12 p.m.

Static Code Injection

2022-03-0616:12:07
crowdoverflow
www.huntr.dev
21
microweber application
html tags
static code injection
sensitive fields
phishing attack
bug bounty

EPSS

0.002

Percentile

57.1%

Description

The Microweber application allows HTML tags in the “First name”, “Last name” and “Phone number” which can be exploited by Injecting HTML payloads.

Proof of Concept

1.While buying product we need to fill contact information form.

2.Insert your html code in code block. e.g., <code><p>Hurry Up!<a href>Go to https://evil.com and get free $1000 in your account now .</a></p></code> (any field except mail)

3.Click on Continue, then your code will be injected into the Personal information section which can be viewed on ‘domain/shipping-method’ page.

Image & Video POC

https://drive.google.com/drive/folders/1hVdfSQrknQNHOudKPK0ZvqsXkqQxxdtW?usp=sharing

Impact

This vulnerability can be exploit for phishing attack

EPSS

0.002

Percentile

57.1%

Related for 3C070828-FD00-476C-BE33-9C877172363D