Cross-site Scripting (XSS) - Stored in zikula/core
Valid
Reported on
Aug 31st 2021
✍️ Description
Cross-Site Scripting (XSS) attacks are a type of injection, in which malicious scripts are injected into otherwise benign and trusted websites
🕵️♂️ Proof of Concept
// PoC.js
1- Go to --> https://demo.ziku.la/blocks/admin/block/edit/2
2- Go to Editor and link a test word with a link ( As mentionned in the picture attached )
3- Inject " javascript:alert(document.domain); " and click ok & Save the Block .
4 - Click view the Block to see it and Click the word you linked . You will get an alert . in my Case here i clicked the " Slack " word.
Go --> https://demo.ziku.la/blocks/admin/block/view/2 to View the block i've already edited . Click " Slack " word and you will get an alert.
** See this ( Attahced pics ) **
POC1 --> https://i.ibb.co/T4QLgVT/POC1.png
POC2 --> https://i.ibb.co/gVyd5qx/POC.png
💥 Impact
\.. This vulnerability is capable of... steal user session , takeover user account , make redirect user to attacker controlled site ...//
Occurrences
We have contacted a member of the
zikula/core
team and are waiting to hear back
2 years ago
The fix bounty has been dropped
This vulnerability will not receive a CVE
to join this conversation