Stored XSS in Email Blacklist Function in pimcore/pimcore
Reported on
Feb 14th 2023
Description
Stored attacks are those where the injected script is permanently stored on the target servers, such as in a database, in a message forum, visitor log, comment field, etc. The victim then retrieves the malicious script from the server when it requests the stored information. Stored XSS is also sometimes referred to as Persistent or Type-I XSS.
There is Stored XSS vulnerability in Email Blacklist Function https://demo.pimcore.fun/admin/?_dc=1676373439&perspective=
This is due to lack of sanitizaiton when inserting email addresses in the application.
Proof of Concept
<img/src=x onError="${x}
;alert(xss-yara
);"> -@ex_mi
Collaboration note
This issue is a collaborate with Ahmed Hassan
Impact
The attacker can execute arbitrary JavaScript and steal Cookies information and use them to hijack the user's session.
Hello,
I just have a question, please. Can you assign the CVE to 2 Persons or more ?
Because we worked on many Vulnerabilities together.
Would this be possible ?
Thank you
Hi @0xy37, we are looking into the issue. yes, we can credit 2 authors on Github security Advisory so please mention the accounts. thanks!
Can you also add @ahmedvienna as a contributor!
Thanks 🙏
Done. see https://github.com/pimcore/pimcore/security/advisories/GHSA-96hp-38wx-j3wc