Cross-site Scripting (XSS) - Reflected in collectiveaccess/providence
Reported on
Oct 25th 2021
Description
Reflected XSS in form Search.
After report https://huntr.dev/bounties/b76d075f-f6b2-40f0-b08e-a56e934d7c60/
I have retested the vulnerability and my payload is able to bypass your filter mechanism.
The input tag of the search form was escaped by my payload
<input type="text" name="search" length="15" id="caQuickSearchFormText" value="/*-/*`/*\\`/*'/*" **="" (="" *="" onclick="alert('xss')" )="" "="" onfocus="this.value='';">
Step to Reproduct
Login to Panel
At Search input with payload: /*-/*`/*\`/*'/*"/**/(/* */oNcliCk=alert('xss') )//
The XSS will trigger when clicking to form search again
Impact
This vulnerability has the potential to steal a user's cookie and gain unauthorized access to that user's account through the stolen cookie.
Thanks for catching this! That error was staring us in the face for a good long while We've patched it now.