Reflected XSS on "DetailViewAjax" via "relation_id" parameter in tsolucio/corebos
Reported on
Aug 31st 2022
Description
The value of the "relation_id" parameter on the "DetailViewAjax" reflects to the source code without any sanitization. So, that leads to XSS which allows cookie stealing.
Proof of Concept
https://demo.corebos.com/index.php?module=Leads&action=LeadsAjax&file=DetailViewAjax&record=4514&ajxaction=LOADRELATEDLIST&header=Emails&relation_id=13%27%20id%3Dx%20tabindex%3D1%20onfocus%3Dalert(document.domain)%20a=&actions=add&start=#x
Impact
This vulnerability allows the attacker to inject his own JavaScript code into the "DetailViewAjax" file via crafted link.