zPrototype / CVE-2023-29808

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

Exploit Title: Reflected Cross Site Scripting

Description:

The vulnerability found is Reflected Cross Site Scripting. When the /index.php?map=overview&findme= endpoint is hit with a request where the "findme" parameter contains a malicious payload we have the possibility to perform an XSS attack. This happens because the input isn't sanitized.

Steps to reproduce:

  1. Clone the repository and install the application
  2. Send a maliciously crafted payload via the "findme" parameter to the following endpoint: /index.php?map=overview&findme=
  3. The payload used is: ";alert(document.cookie)//
  4. Simply visiting the complete URL: http://IP/index.php?map=overview&findme=";alert(document.cookie)// is enough. Now an alertbox should pop up with your current cookie value. Screenshot 2023-05-03 at 17.56.59

Special thanks goes out to iCaotix who greatly helped me in getting the environment setup as well as debugging my payload.

About