Improper Neutralization of Special Elements Used in a Template Engine in microweber/microweber

Valid

Reported on

Mar 6th 2022


Description

The Microweber application allows HTML tags in the "Blog Comments" which can be exploited by Injecting HTML payloads.

Proof of Concept

1.Open any blog in which comment is allowed.

2.Insert your html code in code block. e.g., <code><p>Hurry Up!<a href="evil.com">Go to https://evil.com and get free $1000 in your account now .</a></p></code>

3.Post this code as comment

Video & Image PoC

https://drive.google.com/drive/folders/1iitC8a7Pq_GNbOew5tyKoR8O4Z05MM6v?usp=sharing

Impact

This vulnerability can be exploit for phishing attack

References

We are processing your report and will contact the microweber team within 24 hours. 3 months ago
We have contacted a member of the microweber team and are waiting to hear back 3 months ago
Bozhidar Slaveykov validated this vulnerability 2 months ago
crowdoverflow has been awarded the disclosure bounty
The fix bounty is now up for grabs
Bozhidar Slaveykov confirmed that a fix has been merged on e02244 2 months ago
Bozhidar Slaveykov has been awarded the fix bounty
to join this conversation