Lucene search

K
huntrScriptidiotB99517C0-37FC-4EFA-AB1A-3591DA7F4D26
HistoryMar 11, 2022 - 5:08 p.m.

Multiple Stored Cross-site Scripting (XSS) Vulnerabilities in Shop's Other Settings, Shop's Autorespond E-mail Settings and Shops' Payments Methods

2022-03-1117:08:04
scriptidiot
www.huntr.dev
13

5.4 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N

3.5 Low

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:S/C:N/I:P/A:N

0.001 Low

EPSS

Percentile

50.0%

Description

(1) Checkout URL and Custom order id parameters are vulnerable to stored XSS, which are located in Shop > Settings > other settings > Advanced

(2) From e-mail address and From name parameters are vulnerable to stored XSS, which are located in Shop Settings > Autorespond E-mail settings > check your e-mail settings

(3) Template Name, Template type, From Name, From E-mail and Subject parameters are vulnerable to stored XSS, which are located in Shop Settings > Autorespond E-mail settings > Edit Templates / Add new email template

(4) Multiple fields in the settings of Payment method settings are vulnerable to stored XSS, which are located in Shop Settings > Autorespond E-mail settings > check your e-mail settings > Test Mail Sending Method

(5) Send test email to and Test mail subject parameters of Send test email function are vulnerable to stored XSS, which are located in Shop Settings > Payment > Settings of each method

Proof of Concept for (1)

Step (1) : Access https://demo.microweber.org/demo/admin/view:shop/action:options#option_group=shop/orders/settings/other

Step (2): Click Advanced

Step (3): Put payload below in Checkout URL or Custom order id parameter

"><img src>

Refresh this page, stored XSS will be triggered.
image

Proof of Concept for (2)

Step (1) : Access https://demo.microweber.org/demo/admin/view:settings#option_group=shop/orders/settings/setup_emails_on_order

Step (2): Click check your e-mail settings

Step (3): Put payload below in From e-mail address or From name parameter

"><img src>

image

Proof of Concept for (3)

Step (1) : Access https://demo.microweber.org/demo/admin/view:settings#option_group=shop/orders/settings/setup_emails_on_order

Step (2): Click Add new email template or Edit Templates

Step (3): Put payload below in Template Name, Template type, From Name, From E-mail or Subject parameters (*for type parameter, need to change in request)

"><img src>
image

Proof of Concept for (4)

Step (1) : Access https://demo.microweber.org/demo/admin/view:settings#option_group=shop/payments/admin

Step (2): Click Settings of Paypal Express

Step (3): Put payload below in Paypal username

"><img src>
image

Proof of Concept for (5)

Step (1) : Access https://demo.microweber.org/demo/admin/view:settings#option_group=email

Step (2): Click Test Mail Sending Method

Step (3): Put payload below in Send test email to or Test mail subject

"><img src>

Step (4): Click save email settings

image

Impact

If an attacker can control a script that is executed in the victim’s browser, they might compromise that user, in this case, an admin, by stealing its cookies.

5.4 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N

3.5 Low

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:S/C:N/I:P/A:N

0.001 Low

EPSS

Percentile

50.0%

Related for B99517C0-37FC-4EFA-AB1A-3591DA7F4D26