Cross-site Scripting (XSS) - Stored in namelessmc/nameless

Valid

Reported on

Aug 23rd 2021


✍️ Description

Cross-Site Scripting (XSS) attacks are a type of injection, in which malicious scripts are injected into websites. An attacker can use XSS to send a malicious script to an unsuspecting user. The end user’s browser has no way to know that the script should not be trusted, and will execute the script.

https://github.com/NamelessMC/Nameless/ is vulnerable to XSS as shown below:

🕵️‍♂️ Proof of Concept

Vulnerable resource: Nameless/modules/Core/pages/panel/emails.php
Vulnerable variable: $_POST['port']

Perform the following actions:

  1. Visit http://localhost/Nameless-2/index.php?route=/panel/core/emails/.
  2. Insert data on the fields. Insert 123);echo "<script>alert(/xss/)</script>";/* in the port field.
  3. Visit http://localhost/Nameless-2/core/email.php and observe the javascript code injected.

This vulnerability allows to inject javascript code on server's resources.

</br> </br>

💥 Impact

Because it thinks the script came from a trusted source, the malicious script can access any cookies, session tokens, or other sensitive information retained by the browser and used with that site. These scripts can even rewrite the content of the HTML page.

We have contacted a member of the namelessmc/nameless team and are waiting to hear back 3 months ago
We have contacted a member of the namelessmc/nameless team and are waiting to hear back 3 months ago
Sam validated this vulnerability 3 months ago
hitisec has been awarded the disclosure bounty
The fix bounty is now up for grabs
Sam confirmed that a fix has been merged on a07f9d 3 months ago
Sam has been awarded the fix bounty