Cross-site Scripting (XSS) - Reflected in falconchristmas/fpp
Reported on
Jun 26th 2021
✍️ Description
?tab=
parameter is vulnerable to Cross Site Scripting. Line 1974 of backup.php
sends unvalidated data to a web browser, which can result in the browser executing malicious code of XSS.
🕵️♂️ Proof of Concept
POC SCREENSHOT: https://drive.google.com/file/d/1PLPST2oUY96EeOhF2kfV2ZpK_OVrN2K8/view?usp=sharing
- Just visit
/settings.php?tab=</script><script>alert(1)
and XSS will be pop up.
Vulnerable Code
<?php
# reading unvalidated user input from GET request and assiging it to "tab" parameter.
if (isset($_GET['tab']))
# print the javascript output to the end user
print $_GET['tab'];
else
print "0";
?>;
💥 Impact
The attacker can:
- Perform any action within the application that the user can perform.
- View any information that the user is able to view.
- Modify any information that the user is able to modify.
- Initiate interactions with other application users, including malicious attacks, that will appear to originate from the initial victim user.