제출 #628437: Scada-LTS 2.7.8.1 Cross Site Scripting정보

제목Scada-LTS 2.7.8.1 Cross Site Scripting
설명Multiples Stored Cross-Site Scripting (XSS) in mailing_lists.shtm Summary Multiples Stored Cross-Site Scripting (XSS) vulnerability was identified in the mailing_lists.shtm endpoint of the Scada-LTS application. This vulnerability allows attackers to inject malicious scripts into the name, userList and address parameters. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk. Details Vulnerable Endpoint: mailing_lists.shtm Parameters: name,userList and address The application fails to properly validate and sanitize user inputs in the name, userList and address parameters. This lack of validation allows attackers to inject malicious scripts, which are then stored on the server. Whenever the affected page is accessed, the malicious payload is executed in the victim's browser, potentially compromising the user's data and system. PoC Step by Step: Access vulnerable endpoint, insert the payload in second field ("Name"). Note: As admin, you can add a test user in users.shtm page with the same payload, select the test user (named with the paylod) and click on "+" to add the xss in third field ("Add user") (Steps 2 and 3). The payload will be activated automatically. Insert the paylod in fourth field ("Add address"), click on "+" to add. The payload will be activated automatically. Then, click on "disk" to save and the payloads will be activated automatically. Payload: <img src=x onerror=alert(40)> Image 1: https://github.com/KarinaGante/KGSec/raw/main/CVEs/images/storedXss30.png Image 2: https://github.com/KarinaGante/KGSec/raw/main/CVEs/images/storedXss31.png Image 3: https://github.com/KarinaGante/KGSec/raw/main/CVEs/images/storedXss32.png Image 4: https://github.com/KarinaGante/KGSec/raw/main/CVEs/images/storedXss36.png Image 5: https://github.com/KarinaGante/KGSec/raw/main/CVEs/images/storedXss37.png Impact Stealing session cookies: Attackers can use stolen session cookies to hijack a user's session and perform actions on their behalf. Downloading malware: Attackers can trick users into downloading and installing malware on their computers. Hijacking browsers: Attackers can hijack a user's browser or deliver browser-based exploits. Stealing credentials: Attackers can steal a user's credentials. Obtaining sensitive information: Attackers can obtain sensitive information stored in a user's account or in their browser. Defacing websites: Attackers can deface a website by altering its content. Misdirecting users: Attackers can change the instructions given to users who visit the target website, misdirecting their behavior. Damaging a business's reputation: Attackers can damage a business's image or spread misinformation by defacing a corporate website. Finder Discovered by Karina Gante Official Member of CVE-Hunters
원천⚠️ https://github.com/KarinaGante/KGSec/blob/main/CVEs/Scada-LTS/3.md
사용자
 karinagante (UID 88113)
제출2025. 08. 04. PM 10:29 (9 개월 ago)
모더레이션2025. 08. 19. AM 09:22 (14 days later)
상태수락
VulDB 항목320521 [Scada-LTS 2.7.8.1 mailing_lists.shtm name/userList/address 크로스 사이트 스크립팅]
포인트들20

Might our Artificial Intelligence support you?

Check our Alexa App!