Cross-site Scripting (XSS) - Stored in tsolucio/corebos

Valid

Reported on

Dec 9th 2021


Description

Stored Cross-Site Scripting (XSS) vulnerability due to the lack of content validation and output encoding. This vulnerability can be exploited by uploading a crafted payload inside a document.

Proof of Concept

https://demo.corebos.com/index.php?module=Users&action=index&parenttab=Settings

settings >users >Editing users "Administrator" 
4. Signature  >sources

POC

https://drive.google.com/file/d/1lddcq22RjFDf317inKo_tdPQcMUkeiiE/view?usp=sharing

https://drive.google.com/file/d/1CCyYY44pa2l5Zfge4-FHBNDnpeMKKsOI/view?usp=sharing


XSS Payload

https://drive.google.com/file/d/1qSuKtzButCGbXCHnwFUll3FNJ-gxB-eH/view?usp=sharing

Impact

Stored XSS generally occurs when user input is stored on the target server, such as in a database, in a message forum, visitor log, comment field, etc. And then a victim is able to retrieve the stored data from the web application without that data being made safe to render in the browser.

We are processing your report and will contact the tsolucio/corebos team within 24 hours. a year ago
We have contacted a member of the tsolucio/corebos team and are waiting to hear back a year ago
Joe Bordes validated this vulnerability a year ago
Raptor has been awarded the disclosure bounty
The fix bounty is now up for grabs
Joe Bordes marked this as fixed in 8.0 with commit bcb740 a year ago
Joe Bordes has been awarded the fix bounty
This vulnerability will not receive a CVE
Font.php#L1-L161 has been validated
to join this conversation