提出 #648837: Portabilis i-educar 2.10 Cross Site Scripting (XSS) Stored情報

タイトルPortabilis i-educar 2.10 Cross Site Scripting (XSS) Stored
説明# Cross-Site Scripting (XSS) Stored endpoint `educar_funcao_cad.php` parameters `abreviatura`, `tipoacao` --- ## Summary A Stored Cross-Site Scripting (XSS) vulnerability was identified in the `educar_funcao_cad.php` endpoint of the _i-educar_ application. This vulnerability allows attackers to inject malicious scripts into the `abreviatura` and `tipoacao` parameters. The injected payloads are stored on the server and are automatically executed in the browser of any user who accesses the affected function entry, creating a persistent attack vector. --- ## Details **Vulnerable Endpoint:** `POST /educar_funcao_cad.php` **Parameters:** `abreviatura`, `tipoacao` The application fails to properly validate and sanitize user input in the `abreviatura` and `tipoacao` fields. As a result, attackers can inject arbitrary JavaScript code, which is stored in the system and executed when the affected record is viewed in the application interface. --- ## PoC **Payload 1:** `"><svg onload=alert(15888888)>` **Payload 2:** `"><script>alert('XSS-PoC')</script>` ### Steps to Reproduce: 1. Log in to the _i-educar_ application using an account with permissions to create or edit function entries. 2. Navigate to **Servidores > Cadastros > Tipos > Funções** and click **"Add"** to create a new function or **"Edit"** to modify an existing one. 3. In the **Abreviatura** and/or **Tipo Ação** fields (which map to the `abreviatura` and `tipoacao` parameters), insert one of the payloads above. 4. Fill in the remaining required fields and click **Save**. <img width="1295" height="648" alt="Pasted image 20250810021445" src="https://github.com/user-attachments/assets/96e801b7-ff2f-44d8-b55c-f88da6603cef" /> 5. The stored payload is executed immediately in the browser, confirming the Stored XSS vulnerability. <img width="1193" height="615" alt="Pasted image 20250810021508" src="https://github.com/user-attachments/assets/5d789ed9-3920-49b4-a064-1a076a529205" /> 6. To trigger the XSS in the `tipoacao` parameter, the tester must change the fileds directly in de request. And send it to trigger the XSS. This is a reflected XSS. <img width="727" height="599" alt="Pasted image 20250810023823" src="https://github.com/user-attachments/assets/e0c325ac-7058-4f48-9ff9-c3500104441b" /> <img width="1228" height="568" alt="Pasted image 20250810023921" src="https://github.com/user-attachments/assets/dad4d2bc-d22f-49ff-a7c0-2c923d7c47b9" /> --- ## Impact Stored XSS vulnerabilities can lead to severe consequences, including: - **Session hijacking:** Stealing cookies or authentication tokens to impersonate users - **Credential theft:** Capturing usernames and passwords through malicious scripts - **Malware delivery:** Distributing harmful code to legitimate users - **Privilege escalation:** Exploiting administrative accounts via persistent scripts - **Content manipulation:** Altering displayed application data - **Reputation damage:** Eroding trust among system users and stakeholders
ソース⚠️ https://github.com/marcelomulder/CVE/blob/main/i-educar/Cross-Site%20Scripting%20(XSS)%20Stored%20endpoint%20%60educar_funcao_cad.php%60%20parameters%20%60abreviatura%60,%20%60tipoacao%60.md
ユーザー
 marceloQz (UID 87549)
送信2025年09月05日 17:28 (8 月 ago)
モデレーション2025年09月17日 07:53 (12 days later)
ステータス承諾済み
VulDBエントリ324608 [Portabilis i-Educar 迄 2.10 Editar Função Page educar_funcao_cad.php abreviatura/tipoacao クロスサイトスクリプティング]
ポイント20

Do you want to use VulDB in your project?

Use the official API to access entries easily!