Loading HuntDB...

Cross Site Scripting (XSS) Stored - Private messaging

Low
C
Concrete CMS
Submitted None
Reported by javakhishvili

Vulnerability Details

Technical details and impact analysis

Cross-site Scripting (XSS) - Stored
• Title: concrete5-8.5.2 Cross Site Scripting (XSS) Stored - Private messaging • Keyword: crayons • Software : concrete5 • Product Version: 8.5.2 • Vulnerability : Cross Site Scripting (XSS) Stored • Vulnerable component: Private messaging concrete5 latest version 8.5.2 suffer from persistent (Stored) cross site scripting and html injection vulnerabilities. Insufficient validation of user input on the authenticated part of the concrete5 application exposes the application to persistent cross site scripting (XSS) vulnerabilities. These vulnerabilities enable potentially dangerous input from the user to be accepted by the application and then embedded back in the HTML response of the page returned by the web server. It is possible for lowest privileged user with access to private messaging to send private message to Administrator with malicious XSS payload. - Steps to Reproduce: Login as basic user and visit private messages, and if there is message from admin you can just reply to it and insert the XSS payload into the body area and submit. Then login as Admin user who would have received the message and when the admin checks the messages there will be message body where admin will hover over the mouse on message body, and either admin will be automatically redirected to malicious site or the XSS payload will render in the browser. Both payloads are provided below: - Two Attack vector: • <input><img src=a onmouseover=window.location.href='https://www.test.com'> • <img src=x onmouseover=alert('XSS-Stored')>Bar - Vulnerable parameter: msgBody See four screenshots below illustrating both injection part and the part where the payload renders in the browser ## Impact It is possible for lowest privileged user with access to private messaging to send private message to Administrator with malicious XSS payload. Cross-site scripting is a flaw that allows users to inject HTML or JavaScript code into a page enabling arbitrary input. Stored XSS allows an attacker to embed a malicious script into a vulnerable page, which is then executed when a victim views the page in this case Admin

Report Details

Additional information and metadata

State

Closed

Substate

Resolved

Submitted

Weakness

Cross-site Scripting (XSS) - Stored