XSS Stored inside Admin logs in thorsten/phpmyfaq
Reported on
Oct 30th 2022
Description
If an attacker attempt to login with an XSS payload inside the username, the login attempt will be logged on the admin dashboard. Then, if an admin visits the login logs page, it will execute the XSS.
Proof of Concept
Login with XSS inside username
Admin visits logs
Impact
XSS can cause a variety of problems for the end user that range in severity from an annoyance to complete account compromise. The most severe XSS attacks involve disclosure of the user’s session cookie, allowing an attacker to hijack the user’s session and take over the account. Other damaging attacks include the disclosure of end user files, installation of Trojan horse programs, redirecting the user to some other page or site, or modifying presentation of content. An XSS vulnerability allowing an attacker to modify a press release or news item could affect a company’s stock price or lessen consumer confidence. An XSS vulnerability on a pharmaceutical site could allow an attacker to modify dosage information resulting in an overdose. Source OWASP - Cross Site Scripting (XSS).
References
Yes this one was pretty interesting, perfect fix btw. Could we assign a CVE ? @admin @maintainer
The CVE is now in the hands of the maintainer, he will be asked if he wants one assigned on publication :)