Security
Headlines
HeadlinesLatestCVEs

Headline

CVE-2022-1439: Reflected XSS on demo.microweber.org/demo/module/ in microweber

Reflected XSS on demo.microweber.org/demo/module/ in GitHub repository microweber/microweber prior to 1.2.15. Execute Arbitrary JavaScript as the attacked user. It’s the only payload I found working, you might need to press “tab” but there is probably a paylaod that runs without user interaction.

CVE
#xss#web#js#git#java

Description

Reflected XSS with filter bypass on /demo/module/ using module= & style= parameters.

Proof of Concept

https://demo.microweber.org/demo/module/?module='ont<a>ransitionend=alert(1)'"tabindex=1&style=transition:outline%200.001s&id=x&data-show-ui=admin&class=x&from_url=https://demo.microweber.org

Press tab for the alert() to show up.

Okay 3 things to unpack here:

  • " and ' at various places allow breaking out of the html (root cause of the XSS)
  • ont<x>ransitionend gets sanitized to ontransitionend and bypasses the xss filter
  • style="transition:outline 1s" tabindex=1 is the setup you need to trigger a transition without a <style> tag

Took me some time to finally find a XSS payload that runs here :)

I’d suggest you do not allow breaking out of the html here, so filter ' & ". ont<x>ansitionend should be examined, this trick doesn’t work in every parameter. Additionally, some js eventhandlers are allowed e.g. onunhandledrejection, you could think about a on.*= regex.

Impact

Execute Arbitrary JavaScript as the attacked user.

It’s the only payload I found working, you might need to press “tab” but there is probably a paylaod that runs without user interaction.

CVE: Latest News

CVE-2023-50976: Transactions API Authorization by oleiman · Pull Request #14969 · redpanda-data/redpanda
CVE-2023-6905
CVE-2023-6903
CVE-2023-6904
CVE-2023-3907