| 제목 | Portabilis i-Educar 2.9.0 Stored Cross Site Scripting |
|---|
| 설명 | Hello team!
This vulnerability allows an attacker to store malicious JavaScript in the "Motivo" field of the calendar module. The payload is then executed whenever the listing page is accessed, impacting all users with access to this module. This can lead to:
Session hijacking
Credential theft
Redirection to malicious websites
Full browser compromise depending on browser/plugins/extensions
1. Log in
Authenticate to the i-Educar platform using valid credentials.
2. Go to "Tipos de evento do calendário"
Access the calendário via:
Escola > Cadastro > Tipo > Calendário
/intranet/educar_calendario_dia_motivo_lst.php
4. Edit or Create an "Calendário Dia Motivo - Listagem"
Insert the XSS payload in the "Motivo" (nm_motivo) field:
<script>alert('PoC VulDB i-Educar PaCXXX')</script>
4. Save the Appointment
Click "Salvar".
5. Trigger the Payload
Reopen the page — the script will execute.
|
|---|
| 원천 | ⚠️ https://github.com/RaulPazemecxas/PoCVulDb/blob/main/README18.md |
|---|
| 사용자 | RaulPACXXX (UID 84502) |
|---|
| 제출 | 2025. 06. 27. PM 09:04 (10 개월 ago) |
|---|
| 모더레이션 | 2025. 07. 19. AM 07:53 (21 days later) |
|---|
| 상태 | 수락 |
|---|
| VulDB 항목 | 316981 [Portabilis i-Educar 까지 2.10 Calendar educar_calendario_dia_motivo_cad.php Motivo/descricao 크로스 사이트 스크립팅] |
|---|
| 포인트들 | 20 |
|---|