Headline
CVE-2022-1997: Bypass filter - Stored XSS in Resources in rosariosis
Cross-site Scripting (XSS) - Stored in GitHub repository francoisjacquet/rosariosis prior to 9.0.
Description
Website does incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users. This fix for this bug https://huntr.dev/bounties/dcf87c0b-6188-4817-8798-ef1e2581b15a/ can be bypassed using bellow payload
jAvAsCrIpT:alert(origin)
Steps to reproduce [it works on Firefox (not in chromium based browsers)]
1.Go to https://www.rosariosis.org/demonstration/ and login with administrator account
2.Go to https://www.rosariosis.org/demonstration/Modules.php?modname=Resources/Resources.php
3.Create new link with content jAvAsCrIpT:alert(origin)
4.Click the link and observe a pop up
Image POC
https://drive.google.com/file/d/11F1mjqytYIgmMVtOEC4EbOHhvVi0pEPh/view?usp=sharing
https://drive.google.com/file/d/1dGPRWE6KRf2bfOezRblbWtHAwM1P29iL/view?usp=sharing
Impact
User clicking the link can be affected by malicious javascript code created by the attacker.
Related news
Cross-site Scripting (XSS) - Stored in GitHub repository francoisjacquet/rosariosis prior to 9.0.