Improper Neutralization of Special Elements Used in a Template Engine in microweber/microweber
Mar 6th 2022
The Microweber application allows HTML tags in the "Blog Comments" which can be exploited by Injecting HTML payloads.
Proof of Concept
1.Open any blog in which comment is allowed.
2.Insert your html code in code block. e.g., <code><p>Hurry Up!<a href="evil.com">Go to https://evil.com and get free $1000 in your account now .</a></p></code>
3.Post this code as comment
Video & Image PoC
This vulnerability can be exploit for phishing attack
Bozhidar Slaveykov validated this vulnerability a year ago
crowdoverflow has been awarded the disclosure bounty
The fix bounty is now up for grabs
Bozhidar Slaveykov marked this as fixed in 1.3 with commit e02244 a year ago
This vulnerability will not receive a CVE
to join this conversation