Reflected XSS on "DetailViewAjax" via "relation_id" parameter in tsolucio/corebos

Valid

Reported on

Aug 31st 2022


Description

The value of the "relation_id" parameter on the "DetailViewAjax" reflects to the source code without any sanitization. So, that leads to XSS which allows cookie stealing.

Proof of Concept

https://demo.corebos.com/index.php?module=Leads&action=LeadsAjax&file=DetailViewAjax&record=4514&ajxaction=LOADRELATEDLIST&header=Emails&relation_id=13%27%20id%3Dx%20tabindex%3D1%20onfocus%3Dalert(document.domain)%20a=&actions=add&start=#x

Impact

This vulnerability allows the attacker to inject his own JavaScript code into the "DetailViewAjax" file via crafted link.

We are processing your report and will contact the tsolucio/corebos team within 24 hours. 23 days ago
We have contacted a member of the tsolucio/corebos team and are waiting to hear back 22 days ago
Joe Bordes validated this vulnerability 22 days ago
Bugra has been awarded the disclosure bounty
The fix bounty is now up for grabs
The researcher's credibility has increased: +7
Joe Bordes confirmed that a fix has been merged on 7cd68a 22 days ago
Joe Bordes has been awarded the fix bounty
to join this conversation