Lucene search

K
huntrScgajge129755AE6A-B08B-40A0-8089-C723B2D9CA52
HistoryNov 27, 2021 - 7:06 a.m.

Cross-site Scripting (XSS) - Stored in francoisjacquet/rosariosis

2021-11-2707:06:03
scgajge12
www.huntr.dev
5

0.001 Low

EPSS

Percentile

21.6%

Description

I found XSS in the file upload function of the message function.

Proof of Concept

Step

1.First, access the latest version of the demo environment. "Https://www.rosariosis.org/demonstration/index.php"

2.Then log in with your student account. Student: username and password β€œstudentβ€œ

3.After logging in, access β€œMESSAGING > Write” from the menu on the left. (/demonstration/Modules.php?modname=Messaging/Write.php)

4.Then enter the title and message as appropriate.

5.Now upload the SVG file containing XSS to β€œFile Attached”.

6.Finally, select β€œTeach Teacher” as the destination and send.

7.Log in from here with your teacher’s account. Teacher: username and password β€œteacherβ€œ

8.After logging in, access β€œMESSAGING > Messages” from the menu and select the message you just sent.

9.Then click on the last attached file and a pop-up screen will appear.

Summary

-Endpoint: POST /demonstration/Modules.php?modname=Messaging/Write.php&search_modfunc=list&recipients_key=staff_id&subject=<title>&message=<message>&recipients_ids[0]=2&send=Send

-Attachment: SVG file

-Test Payload: <script type="text/javascript">alert(document.cookie)</script>

Impact

This vulnerability can steal a user’s cookie.

0.001 Low

EPSS

Percentile

21.6%

Related for 9755AE6A-B08B-40A0-8089-C723B2D9CA52