Xss vulnerability in Button module in microweber/microweber
Reported on
Sep 29th 2022
Steps
1.Visit https://demo.microweber.org
2.Click option 'Modules' in the left list
3.Click and go into the 'Button'
4.Click the 'edit url' and Enter the following
><script>alert(1)
Proof of Concept Video
https://1drv.ms/v/s!Ai0UEGpMIb9scRgdvmX1sBCQu4A
Impact
Phishing, including obtaining various user accounts
Steal the user's cookies to obtain the user's privacy information, or use the user's identity to further operate the website;
Hijacking user (browser) sessions to perform arbitrary operations, such as illegal transfer, forced posting of logs, e-mail, etc
Forced pop up of advertising pages, traffic, etc
Web hanging horse;
Conduct malicious operations, such as arbitrarily tampering with page information, deleting articles, etc
Carry out a large number of client attacks, such as ddos
Obtain client information, such as user's browsing history, real p, open port, etc
Control the victim's machine to attack other websites;
Implement progress hazards in combination with other vulnerabilities, such as csrf;
Improve user rights, including further penetration of the website
Propagating cross site scripting worms, etc
hi,@admin,@Maintainer,can you assign a cve for this bug?
Unfortunately, we had a bug and this report was stuck, the report has now been published and CVE assigned as requested. Thanks:)