إرسال #605633: Portabilis i-Educar 2.9.0 Stored Cross Site Scriptingالمعلومات

عنوانPortabilis i-Educar 2.9.0 Stored Cross Site Scripting
الوصفA stored XSS vulnerability was identified in the i-Educar system within the Agenda module. Authenticated users can inject malicious JavaScript code into the agenda_rap_titulo/novo_titulo (Title) field of a scheduled appointment. Once saved, the malicious payload is stored in the system's database and is executed every time the Agenda page is viewed by any user, including administrators. 1 - Log in to the i-Educar platform with valid credentials. 2 - Navigate to: Pessoas > Agenda or directly to /intranet/agenda.php 3 - Click to edit or create a new appointment. 4 - In the Title field (agenda_rap_titulo), insert the payload: <script>alert('PoC VulDB i-Educar PaCXXX')</script> 5 - Click Salvar Alterações. 6 - Reload the Agenda page to trigger the payload execution. Impact: Persistent client-side code execution Potential session hijacking Redirects or phishing attacks Access to user data within session scope
المصدر⚠️ https://github.com/RaulPazemecxas/PoCVulDb/blob/main/README17.md
المستخدم
 RaulPACXXX (UID 84502)
ارسال27/06/2025 07:42 PM (10 أشهر منذ)
الاعتدال19/07/2025 07:53 AM (22 days later)
الحالةتمت الموافقة
إدخال VulDB316980 [Portabilis i-Educar 2.9.0/2.10.0 Agenda /intranet/agenda.php novo_titulo/novo_descricao البرمجة عبر المواقع]
النقاط20

Want to stay up to date on a daily basis?

Enable the mail alert feature now!