Cross-site Scripting (XSS) - Stored in pimcore/pimcore
Reported on
Oct 29th 2021
Description
Cross-Site Scripting (XSS) attacks are a type of injection, in which malicious scripts are injected into otherwise benign and trusted websites.
Proof of Concept
1--> Go Asset Metadata Class Definitions -> Create another one or just edit aprevious one .
2 --> In the Name input Inject any XSS payload .
3 --> getting an alert stored in the server.
// PoC.js
1 --> Video POC -> https://drive.google.com/file/d/1dH7QNp6qpsfulBkv9iVlfIjS6I-YyPMQ/view?usp=sharing
Impact
This vulnerability is capable of...steal user session , takeover user account , make redirect user to attacker controlled site //
Thanks for reporting! However, I do not agree with the severity, since this is an admin-only functionality, there's not much impact in terms of security (an admin can do anyway whatever he wants).
Yes! i know , but linking this with a CSRF attack will lead to a full account takeover !
Hey guys, even pre authentication RCE don't have a 9.8 score … please careful about CVE scores because the users of Pimcore when see this, They may be shocked ….
:/ Not that bad thing ! i know this was a small mistake by me .