Cross-site Scripting (XSS) - Stored in admidio/admidio

Valid

Reported on

Jan 4th 2022


Description

I can create links using the Web links feature. However, since the input value is not URL-encoded, the onfocus and autofocus properties can be used by escaping the properties of the "A" tag using double quotation marks (").

Proof of Concept

https://google.com/"//autofocus//onfocus="alert(document.domain)"//b="
1. Open the https://www.admidio.org/demo_en/adm_program/system/login.php and Login
2. Go to "Web-Link" > "Create new link"
3. Fill in all the input values, enter the above PoC as the value of the Link address, and save it.
4. Click on the saved link

Video : https://www.youtube.com/watch?v=9TZZwSixeCc

Impact

Through this vulnerability, an attacker is capable to execute malicious scripts.

We are processing your report and will contact the admidio team within 24 hours. a year ago
Pocas modified the report
a year ago
We have contacted a member of the admidio team and are waiting to hear back a year ago
Markus Faßbender validated this vulnerability a year ago
Pocas has been awarded the disclosure bounty
The fix bounty is now up for grabs
Pocas
a year ago

Researcher


Hello Markus Faßbender, Can you request a CVE?

Markus Faßbender marked this as fixed in all with commit d86f98 a year ago
Markus Faßbender has been awarded the fix bounty
This vulnerability will not receive a CVE
links_new.php#L77L82 has been validated
to join this conversation