Cross-site Scripting (XSS) - Reflected in gnuboard/gnuboard5
Valid
Reported on
Dec 8th 2021
Description
The reflected XSS vulnerability occurs to a flaw in the clean_xss_tags()
function called in memo.php
of Gnuboard 5. This clean_xss_tags() is a Sanitizer that removes XSS-vulnerable tags and attributes. However, it can bypass Sanitizer by using a newline
character. (%0A, %0D, ETC)
Proof of Concept
1. Open the https://sir.kr/bbs/memo.php?kind=%0D%3C/noscript%3E%3Csvg/onload=alert(document.domain)%3E&spam=1
2. you can see that occur a xss after login
Impact
Through this vulnerability, an attacker is capable to execute malicious scripts.
We are processing your report and will contact the
gnuboard/gnuboard5
team within 24 hours.
2 years ago
Pocas modified the report
2 years ago
We have contacted a member of the
gnuboard/gnuboard5
team and are waiting to hear back
2 years ago
Pocas modified the report
2 years ago
We have sent a
follow up to the
gnuboard/gnuboard5
team.
We will try again in 7 days.
2 years ago
Just for reference, the researcher requested a CVE, and has been confirmed by the maintainer here.
to join this conversation