Lucene search

K
huntrIamshooter994AE2A917-843A-4AE4-8197-8425A596761C
HistoryApr 21, 2022 - 6:43 p.m.

Stored XSS via upload plugin functionality in zip format

2022-04-2118:43:55
iamshooter99
www.huntr.dev
8

0.001 Low

EPSS

Percentile

21.6%

Description

Cross-site scripting (XSS) is a common attack vector that injects malicious code into a vulnerable web application. Stored XSS, also known as persistent XSS, is the more damaging of the two. It occurs when a malicious script is injected directly into a vulnerable web application.

Here name parameter is vulnerable to xss. So after replacing the name with the XSS payload in the facturascripts.ini file. XSS payload will be executed after uploading the modified zip file.

Proof of Concept

  1. log in as a Normal User.
  2. Download any facturascripts plugin like (https://facturascripts.com/DownloadBuild/93/stable).
  3. Unzip it locally and modify name = ‘<script>alert(document.domain)</script>’ in facturascripts.ini file.
  4. Zip it again and upload.
  5. XSS payload will be executed for all users.

PoC

https://drive.google.com/file/d/18NGs-gTbwJVDB9P_1NCfQGUbjT1Jv9MC/view?usp=sharing

0.001 Low

EPSS

Percentile

21.6%

Related for 4AE2A917-843A-4AE4-8197-8425A596761C