Security
Headlines
HeadlinesLatestCVEs

Headline

CVE-2022-3072: Cross-site Scripting (XSS) - Stored in rosariosis

Cross-site Scripting (XSS) - Stored in GitHub repository francoisjacquet/rosariosis prior to 8.9.3.

CVE
#xss#vulnerability#ios#git#java#php

Description

I found XSS in the file upload function of the message function.

Proof of Concept****Step

1.First, access the latest version of the demo environment. “Https://www.rosariosis.org/demonstration/index.php”

2.Then log in with your student account. Student: username and password “student“

3.After logging in, access “MESSAGING > Write” from the menu on the left. (/demonstration/Modules.php?modname=Messaging/Write.php)

4.Then enter the title and message as appropriate.

5.Now upload the SVG file containing XSS to "File Attached".

6.Finally, select “Teach Teacher” as the destination and send.

7.Log in from here with your teacher’s account. Teacher: username and password “teacher“

8.After logging in, access “MESSAGING > Messages” from the menu and select the message you just sent.

9.Then click on the last attached file and a pop-up screen will appear.

Summary

-Endpoint: POST /demonstration/Modules.php?modname=Messaging/Write.php&search_modfunc=list&recipients_key=staff_id&subject=<title>&message=<message>&recipients_ids[0]=2&send=Send

-Attachment: SVG file

-Test Payload: <script type="text/javascript">alert(document.cookie)</script>

Impact

This vulnerability can steal a user’s cookie.

References

  • https://owasp.org/www-community/vulnerabilities/Unrestricted_File_Upload
  • https://owasp.org/www-project-top-ten/2017/A7_2017-Cross-Site_Scripting_(XSS)

CVE: Latest News

CVE-2023-50976: Transactions API Authorization by oleiman · Pull Request #14969 · redpanda-data/redpanda
CVE-2023-6905
CVE-2023-6903
CVE-2023-6904
CVE-2023-3907