제출 #607949: SCADA-LTS 2.7.8.1 Cross Site Scripting정보

제목SCADA-LTS 2.7.8.1 Cross Site Scripting
설명### Summary Stored Cross-Site Scripting (XSS) vulnerability was identified in the `users.shtm` endpoint. This vulnerability allows attackers to inject malicious scripts into the username parameter. The injected scripts are stored on the server and executed automatically whenever the page users.shtm is accessed by users, posing a significant security risk. ### Details Vulnerable Endpoint: `users.shtm` Parameter: `username` Payload: `<img src=x onerror=alert(1)>` The application fails to properly validate and sanitize user inputs in the `username` parameter. This lack of validation allows attackers to inject malicious scripts, which are then stored on the server. Whenever the affected page is accessed, the malicious payload is executed in the victim's browser, potentially compromising the user's data and system. ### PoC Register the payload in the `username` field at the `users.shtm` endpoint. After that, the XSS can be triggered by opening the users.shtm page. ![image](https://github.com/user-attachments/assets/6829597a-1ea5-45b1-8422-aa5ab8306e0a) ![image](https://github.com/user-attachments/assets/c42ea77e-2176-42d0-a6ce-e8e1599cb870) ### Impact - Stealing session cookies: Attackers can use stolen session cookies to hijack a user's session and perform actions on their behalf. - Downloading malware: Attackers can trick users into downloading and installing malware on their computers. - Hijacking browsers: Attackers can hijack a user's browser or deliver browser-based exploits. - Stealing credentials: Attackers can steal a user's credentials. - Obtaining sensitive information: Attackers can obtain sensitive information stored in a user's account or in their browser. - Defacing websites: Attackers can deface a website by altering its content. - Misdirecting users: Attackers can change the instructions given to users who visit the target website, misdirecting their behavior. - Damaging a business's reputation: Attackers can damage a business's image or spread misinformation by defacing a corporate website. by [CVE-Hunters](https://github.com/Sec-Dojo-Cyber-House/cve-hunters)
원천⚠️ https://github.com/nmmorette/vulnerability-research/blob/main/scada2/README.md
사용자
 nmmorette (UID 87361)
제출2025. 07. 02. PM 05:45 (10 개월 ago)
모더레이션2025. 07. 16. PM 10:29 (14 days later)
상태수락
VulDB 항목316710 [Scada-LTS 까지 2.7.8.1 users.shtm 사용자 이름 크로스 사이트 스크립팅]
포인트들20

Do you know our Splunk app?

Download it now for free!