Cross-site Scripting (XSS) - Reflected in jspark311/buriedunderthenoisefloor

Valid

Reported on

Oct 13th 2021


Description

Cross-Site Scripting (XSS) attacks are a type of injection, in which malicious scripts are injected into websites. An attacker can use XSS to send a malicious script to an unsuspecting user. The end user’s browser has no way to know that the script should not be trusted, and will execute the script. https://github.com/jspark311/BuriedUnderTheNoiseFloor/ is vulnerable to XSS as shown below:

Proof of concept

Vuln variable: $_SERVER['PHP_SELF']
Snippet:

<form method='POST' enctype='multipart/form-data' action='<?php echo $_SERVER['PHP_SELF']; ?>'>

Payload

In a browser visit:

http://localhost/BuriedUnderTheNoiseFloor-master/form.php/'%3E%3Cscript%3Ealert%60xss%60%3C/script%3E

Impact

Because it thinks the script came from a trusted source, the malicious script can access any cookies, session tokens, or other sensitive information retained by the browser and used with that site. These scripts can even rewrite the content of the HTML page.

References

https://portswigger.net/web-security/cross-site-scripting https://owasp.org/www-community/attacks/xss/

We created a GitHub Issue asking the maintainers to create a SECURITY.md 7 months ago
We have contacted a member of the jspark311/buriedunderthenoisefloor team and are waiting to hear back 7 months ago
We have sent a follow up to the jspark311/buriedunderthenoisefloor team. We will try again in 7 days. 7 months ago
We have sent a second follow up to the jspark311/buriedunderthenoisefloor team. We will try again in 10 days. 7 months ago
We have sent a third and final follow up to the jspark311/buriedunderthenoisefloor team. This report is now considered stale. 6 months ago
J. Ian Lindsay
3 months ago

Maintainer


This has been fixed by ensuring the PHP execution policy is disable for the upload directory on the webserver.

J. Ian Lindsay validated this vulnerability 3 months ago
hitisec has been awarded the disclosure bounty
The fix bounty is now up for grabs
J. Ian Lindsay confirmed that a fix has been merged on 404a45 3 months ago
The fix bounty has been dropped
to join this conversation