Reflected XSS on "DetailViewAjax" via "relation_id" parameter in tsolucio/corebos


Reported on

Aug 31st 2022


The value of the "relation_id" parameter on the "DetailViewAjax" reflects to the source code without any sanitization. So, that leads to XSS which allows cookie stealing.

Proof of Concept


This vulnerability allows the attacker to inject his own JavaScript code into the "DetailViewAjax" file via crafted link.

We are processing your report and will contact the tsolucio/corebos team within 24 hours. a year ago
We have contacted a member of the tsolucio/corebos team and are waiting to hear back a year ago
Joe Bordes validated this vulnerability a year ago
Bugra has been awarded the disclosure bounty
The fix bounty is now up for grabs
The researcher's credibility has increased: +7
Joe Bordes marked this as fixed in 8.0 with commit 7cd68a a year ago
Joe Bordes has been awarded the fix bounty
This vulnerability will not receive a CVE
to join this conversation