Authenticated HTMLi via theme parameter on /lib/ajax.php in froxlor/froxlor
Valid
Reported on
Dec 30th 2022
Description
The theme parameter is vulnerable to HTMLi on /lib/ajax.php endpoint
Proof of Concept
- go to https://v2.demo.froxlor.org
- Login with a user
- Go to https://v2.demo.froxlor.org/lib/ajax.php?action=newsfeed&theme=%3C/br%3E%3Ch1%3EHTMLi%20by%20leo_rac%3C/h1%3E%3Cbr%3E
- You'll see the injected payload
Impact
In this way it is possible to perform a series of actions ranging from stealing credentials, taking the victim to an arbitrary site, or the possibility of inserting false messages to the victim.
We are processing your report and will contact the
froxlor
team within 24 hours.
10 days ago
The researcher has received a minor penalty to their credibility for miscalculating the severity: -1
The researcher's credibility has increased: +7
The fix bounty has been dropped
This vulnerability has been assigned a CVE
to join this conversation