Reflected XSS in date in fossbilling/fossbilling
Reported on
Jul 1st 2023
Description
There is a reflective XSS on the FOSSBilling admin screen.
Proof of Concept
By accessing the following URL, it is possible to execute any script on the browser of the logged-in administrator user.
URL: https://localhost/admin?_url=%2Fadmin&date_to=2023-07-08&date_from=%27%22%3E%3Cimg%20src=x%20onerror=alert(3)%3E
Payload
'"><img src=x onerror=alert(3)>
Parameter
date_to
date_from
PoC Video
https://drive.google.com/file/d/1Zha4cWz-dBM8PWpmLvQUU2zHn2g_6PME/view?usp=sharing
Impact
An attacker may obtain cookies of logged-in users or perform unauthorized operations on the administrator screen.
Occurrences
ErrorPage.php L140
The payload included in the parameters is included in the error message as is.
Thanks for the report. I've submitted a PR to resolve this: https://github.com/FOSSBilling/FOSSBilling/pull/1394