Improper Neutralization of Special Elements Used in a Template Engine in microweber/microweber
Valid
Reported on
Mar 6th 2022
Description
The Microweber application allows HTML tags in the "Blog Comments" which can be exploited by Injecting HTML payloads.
Proof of Concept
1.Open any blog in which comment is allowed.
2.Insert your html code in code block. e.g., <code><p>Hurry Up!<a href="evil.com">Go to https://evil.com and get free $1000 in your account now .</a></p></code>
3.Post this code as comment
Video & Image PoC
https://drive.google.com/drive/folders/1iitC8a7Pq_GNbOew5tyKoR8O4Z05MM6v?usp=sharing
Impact
This vulnerability can be exploit for phishing attack
References
We are processing your report and will contact the
microweber
team within 24 hours.
a year ago
We have contacted a member of the
microweber
team and are waiting to hear back
a year ago
to join this conversation