Enviar #636956: Portabilis i-Educar 2.10 Cross Site Scriptinginformación

TítuloPortabilis i-Educar 2.10 Cross Site Scripting
DescripciónMultiples Stored Cross-Site Scripting (XSS) in educar_transferencia_tipo_cad.php Summary Multiples Stored Cross-Site Scripting (XSS) vulnerability was identified in the /intranet/educar_transferencia_tipo_cad.php endpoint of the i-Educar application. This vulnerability allows attackers to inject malicious scripts into the nm_tipo and desc_tipo parameters. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk. Details Vulnerable Endpoint: /intranet/educar_transferencia_tipo_cad.php Parameter: nm_tipo, desc_tipo Trigger Page: /intranet/educar_transferencia_tipo_lst.php Other Affected Endpoint: /intranet/educar_transferencia_tipo_det.php?cod_transferencia_tipo=[id] The application fails to properly validate and sanitize user inputs in the nm_tipo and desc_tipo parameters. This lack of validation allows attackers to inject malicious scripts, which are then stored on the server. Whenever the affected page is accessed, the malicious payload is executed in the victim's browser, potentially compromising the user's data and system. PoC Step by Step: Access vulnerable endpoint. Select default option on first field. Insert the payload in second field ("Motivo Transferência") and third field ("Descrição"). Click on "Salvar" and the trigger page will be activated automatically. Payload: "><img src=x onerror=alert('CVE-Hunters')> image 1: https://github.com/KarinaGante/KGSec/raw/main/CVEs/images/storedXss49.png image 2: https://github.com/KarinaGante/KGSec/raw/main/CVEs/images/storedXss50.png image 3: https://github.com/KarinaGante/KGSec/raw/main/CVEs/images/storedXss51.png If click on new register in trigger page, can be redirected to other affected endpoint: /intranet/educar_transferencia_tipo_det.php?cod_transferencia_tipo=[id], confirming that the two fields is vulnerable. image 4: https://github.com/KarinaGante/KGSec/raw/main/CVEs/images/storedXss52.png image 5: https://github.com/KarinaGante/KGSec/raw/main/CVEs/images/storedXss53.png Impact Stealing session cookies: Attackers can use stolen session cookies to hijack a user's session and perform actions on their behalf. Downloading malware: Attackers can trick users into downloading and installing malware on their computers. Hijacking browsers: Attackers can hijack a user's browser or deliver browser-based exploits. Stealing credentials: Attackers can steal a user's credentials. Obtaining sensitive information: Attackers can obtain sensitive information stored in a user's account or in their browser. Defacing websites: Attackers can deface a website by altering its content. Misdirecting users: Attackers can change the instructions given to users who visit the target website, misdirecting their behavior. Damaging a business's reputation: Attackers can damage a business's image or spread misinformation by defacing a corporate website. Finder Discovered by Karina Gante.
Fuente⚠️ https://github.com/KarinaGante/KGSec/blob/main/CVEs/i-educar/13.md
Usuario
 karinagante (UID 88113)
Sumisión2025-08-18 20:22 (hace 8 meses)
Moderación2025-08-29 08:54 (11 days later)
EstadoAceptado
Entrada de VulDB321860 [Portabilis i-Educar hasta 2.10 Cadastrar tipo de transferência Page educar_transferencia_tipo_cad.php nm_tipo/desc_tipo secuencias de comandos en sitios cruzados]
Puntos20

Might our Artificial Intelligence support you?

Check our Alexa App!