Headline
CVE-2022-3072: Cross-site Scripting (XSS) - Stored in rosariosis
Cross-site Scripting (XSS) - Stored in GitHub repository francoisjacquet/rosariosis prior to 8.9.3.
Description
I found XSS in the file upload function of the message function.
Proof of Concept****Step
1.First, access the latest version of the demo environment. “Https://www.rosariosis.org/demonstration/index.php”
2.Then log in with your student account. Student: username and password “student“
3.After logging in, access “MESSAGING > Write” from the menu on the left. (/demonstration/Modules.php?modname=Messaging/Write.php)
4.Then enter the title and message as appropriate.
5.Now upload the SVG file containing XSS to "File Attached".
6.Finally, select “Teach Teacher” as the destination and send.
7.Log in from here with your teacher’s account. Teacher: username and password “teacher“
8.After logging in, access “MESSAGING > Messages” from the menu and select the message you just sent.
9.Then click on the last attached file and a pop-up screen will appear.
Summary
-Endpoint: POST /demonstration/Modules.php?modname=Messaging/Write.php&search_modfunc=list&recipients_key=staff_id&subject=<title>&message=<message>&recipients_ids[0]=2&send=Send
-Attachment: SVG file
-Test Payload: <script type="text/javascript">alert(document.cookie)</script>
Impact
This vulnerability can steal a user’s cookie.
References
- https://owasp.org/www-community/vulnerabilities/Unrestricted_File_Upload
- https://owasp.org/www-project-top-ten/2017/A7_2017-Cross-Site_Scripting_(XSS)