Cross-site scripting - DOM via view file function in microweber/microweber
Reported on
Apr 28th 2022
Description
In Modules -> Files
, when click a file will have a popup and in URL
will append select-file=
fragment, so this fragment in url lead to XSS-DOM.
Proof of Concept
http://localhost/microweber/admin/view:modules/load_module:files#select-file=http://google.com.vn%3Cimg%20src%3dx%20onerror%3d%22alert(window.origin)%22%20x=/%3E
Poc image
Impact
This vulnerability can be arbitrarily executed javascript code to steal user'cookie, perform HTTP request, get content of same origin page, etc ...
Typically, we won't assign CVEs to reports that have such low-security impact - however, if the maintainer is happy to assign and publish one, we can.
@maintainer - are you happy for a CVE to be assigned and published for this report?
Hi @admin @maintainer,
There's unfairness here, because in other report in microweber with same attack vector but it marked high severity, have bounty and CVE, but mine is not :). I am so sorry because i dont understand.
You can see at https://huntr.dev/bounties/d9f9b5bd-16f3-4eaa-9e36-d4958b557687/
Please consider for me
- https://huntr.dev/bounties/eb8160a2-7984-42f1-aa30-bda60e1c6be7/
- https://huntr.dev/bounties/95793a5a-7b81-4967-9730-a6667f129d26/