Reflected Cross Site Scripting in Search Functionality of Module Library in pandorafms/pandorafms

Valid

Reported on

Oct 26th 2022


Description

Hello Team,

Hope you are doing well.

I have found a reflected cross site scripting vulnerability in search functionality present in the module library section.

What is reflected cross site scripting?

Reflected cross-site scripting (or XSS) arises when an application receives data in an HTTP request and includes that data within the immediate response in an unsafe way.

This vulnerability arises on the forget password functionality in which parameter username does not proper input validation/sanitization thus results in executing malicious JavaScript payload.

Steps to reproduce:

  • Add below given xss payload in the search functionality present in module library section & hit search.
  • Payload will be executed. Now copy the url & share with the victim user.
  • Payload will be executed in victim users browser if he/she is authenticated.

Vulnerable URL/Endpoint:

http://127.0.0.1:8080/pandora_console/index.php?sec=gmodule_library&sec2=godmode/module_library/module_library_view&tab=search_module&search=%22%3E%3Ch1%3E%3Cu%3E%3Ci%3Elol123%3C/i%3E%3C/u%3E%3C/h1%3E%3Cscript%3Ealert(document.domain);//

Proof of Concept

https://drive.google.com/drive/folders/18HMChOYvPjqqwhtJX4UVGyIFgJ1mY8KN?usp=sharing

Payload Used = "><h1><u><i>lol123</i></u></h1><script>alert(document.domain);//

Impact

Impact of this vulnerability is

  • Perform any action within the application that the user can perform.
  • View any information that the user is able to view.
  • Modify any information that the user is able to modify.
  • Session hijacking as the JavaScript code can easily access session cookie since the httponly flag is set to false.

Mitigation:

  • Implement security headers such as X-XSS-Protection, CSP for added layer of protection.
  • Proper input validation and sanitization should be performed.
  • Proper output encoding should be performed.
We are processing your report and will contact the pandorafms team within 24 hours. 5 months ago
We have contacted a member of the pandorafms team and are waiting to hear back 5 months ago
We have sent a follow up to the pandorafms team. We will try again in 7 days. 5 months ago
Gaurish
5 months ago

Researcher


Hi @admin, any update on this report?

Pavlos
5 months ago

Admin


Only maintainers can resolve reports not admins. We're sending reminder emails as you see and if they don't respond we encourage you to gently nudge them via other channels :)

The pandora team is pretty responsive, they should be here any day now.

Gaurish
5 months ago

Researcher


Thank you for the update.

We have sent a second follow up to the pandorafms team. We will try again in 10 days. 5 months ago
We have sent a third and final follow up to the pandorafms team. This report is now considered stale. 4 months ago
pandorafms/pandorafms maintainer has acknowledged this report 4 months ago
pandorafms/pandorafms maintainer
4 months ago

Maintainer


Fixed in v767 version, Pending to get CVE ID.

Gaurish
4 months ago

Researcher


Let me know once the cve Id is reserved for this issue...

pandorafms/pandorafms maintainer
4 months ago

Maintainer


CVE-2022-47373 reserved.

Gaurish
2 months ago

Researcher


Hi Team, This issue is fixed. Also, the cve reserved for this bug is published.

@admin please check and close this issue.

pandorafms/pandorafms maintainer
2 months ago

Maintainer


Published https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47373

pandorafms/pandorafms maintainer validated this vulnerability 2 months ago
Gaurish Kauthankar has been awarded the disclosure bounty
The fix bounty is now up for grabs
The researcher's credibility has increased: +7
pandorafms/pandorafms maintainer marked this as fixed in v767 with commit 7bdf10 2 months ago
The fix bounty has been dropped
This vulnerability will not receive a CVE
pandorafms/pandorafms maintainer published this vulnerability 2 months ago
search_results.php#L1-L262 has been validated
to join this conversation