जमा करें #644137: Portabilis i-educar 2.10 Cross Site Scriptingजानकारी

शीर्षकPortabilis i-educar 2.10 Cross Site Scripting
विवरण# Cross-Site Scripting (XSS) Stored endpoint `/usuarios/tipos/(ID)` parameters `"Tipos de Usuário"`, `"Descrição"` --- ## Summary A Stored Cross-Site Scripting (XSS) vulnerability was identified in the `/usuarios/tipos/(ID)` endpoint of the _i-educar_ application. This vulnerability allows attackers to inject malicious scripts into the **"Tipos de Usuário"** and **"Descrição"** fields. The injected payload is stored on the server and is automatically executed in the browser of any user who accesses the affected user type entry, creating a persistent attack vector. --- ## Details App: i-educar v 2.10 **Vulnerable Endpoint:** `POST /usuarios/tipos/(ID)` **Parameters:** `"Tipos de Usuário"`, `"Descrição"` The application fails to properly validate and sanitize user input in the `"Tipos de Usuário"` and `"Descrição"` fields. As a result, attackers can inject arbitrary JavaScript code which is stored in the database and executed when the stored content is viewed through the application’s interface. --- ## PoC **Payload:** `"><script>alert('XSS-PoC-Tipo')</script>` ### Steps to Reproduce: 1. Log in to the _i-educar_ application using an account with permissions to create or edit user types. 2. Navigate to **Configurações > Permissões > Tipos de Usuário** and click **"Edit"** on an existing user type or **"Add"** to create a new one. 3. In the **"Tipos de Usuário"** and/or **"Descrição"** fields, insert the payload above: `"><script>alert('XSS-PoC-Tipo')</script>` ![[Pasted image 20250809201533.png]] 4. Click **Save**. 5. The stored payload is executed immediately in the browser, confirming the Stored XSS vulnerability. ![[Pasted image 20250809201623.png]] --- ## Impact Stored XSS vulnerabilities can lead to: - **Session hijacking:** Stealing cookies or authentication tokens to impersonate users - **Credential theft:** Capturing usernames and passwords through injected scripts - **Malware delivery:** Serving malicious code to application users - **Privilege escalation:** Exploiting admin accounts via persistent scripts - **Content manipulation:** Altering displayed application data - **Reputation damage:** Eroding trust among users and stakeholders
स्रोत⚠️ https://github.com/marcelomulder/CVE/blob/main/i-educar/Cross-Site%20Scripting%20(XSS)%20Stored%20endpoint%20%60.usuarios.tipos.(ID)%60%20parameters%20%60Tipos%20de%20Usu%C3%A1rio%60,%20%60Descri%C3%A7%C3%A3o%60.md
उपयोगकर्ता
 marceloQz (UID 87549)
सबमिशन29/08/2025 04:34 PM (8 महीनों पहले)
संयम07/09/2025 01:45 PM (9 days later)
स्थितिस्वीकृत
VulDB प्रविष्टि323022 [Portabilis i-Educar तक 2.10 /usuarios/tipos/ Tipos de Usuário/Descrição क्रॉस साइट स्क्रिप्टिंग]
अंक20

Want to know what is going to be exploited?

We predict KEV entries!