Blind Stored XSS in administration panel in thorsten/phpmyfaq
Reported on
Dec 15th 2022
Description
Blind stored XSS : any visitor user without any privilege can create "Proposal for a new FAQ" at the following URL https://roy.demo.phpmyfaq.de/index.php?action=add&cat=0 and add XSS payload <img src=x onerror='alert("Stored XSS")'> in "Your question" input field allows any anonymous visitor can steal admin cookies also according the previous bug "bypass captcha" i bypass the captcha to send the request then the payload alerted in administration panel
Proof of Concept
https://drive.google.com/file/d/11ow7qYIi8ciA6lOyyYDabiRHLdIGU-qr/view?usp=sharing
Impact
Lead to admin account takeover also "Secure" flag is false