Submeter #644137: Portabilis i-educar 2.10 Cross Site Scriptinginformação

TítuloPortabilis i-educar 2.10 Cross Site Scripting
Descrição# Cross-Site Scripting (XSS) Stored endpoint `/usuarios/tipos/(ID)` parameters `"Tipos de Usuário"`, `"Descrição"` --- ## Summary A Stored Cross-Site Scripting (XSS) vulnerability was identified in the `/usuarios/tipos/(ID)` endpoint of the _i-educar_ application. This vulnerability allows attackers to inject malicious scripts into the **"Tipos de Usuário"** and **"Descrição"** fields. The injected payload is stored on the server and is automatically executed in the browser of any user who accesses the affected user type entry, creating a persistent attack vector. --- ## Details App: i-educar v 2.10 **Vulnerable Endpoint:** `POST /usuarios/tipos/(ID)` **Parameters:** `"Tipos de Usuário"`, `"Descrição"` The application fails to properly validate and sanitize user input in the `"Tipos de Usuário"` and `"Descrição"` fields. As a result, attackers can inject arbitrary JavaScript code which is stored in the database and executed when the stored content is viewed through the application’s interface. --- ## PoC **Payload:** `"><script>alert('XSS-PoC-Tipo')</script>` ### Steps to Reproduce: 1. Log in to the _i-educar_ application using an account with permissions to create or edit user types. 2. Navigate to **Configurações > Permissões > Tipos de Usuário** and click **"Edit"** on an existing user type or **"Add"** to create a new one. 3. In the **"Tipos de Usuário"** and/or **"Descrição"** fields, insert the payload above: `"><script>alert('XSS-PoC-Tipo')</script>` ![[Pasted image 20250809201533.png]] 4. Click **Save**. 5. The stored payload is executed immediately in the browser, confirming the Stored XSS vulnerability. ![[Pasted image 20250809201623.png]] --- ## Impact Stored XSS vulnerabilities can lead to: - **Session hijacking:** Stealing cookies or authentication tokens to impersonate users - **Credential theft:** Capturing usernames and passwords through injected scripts - **Malware delivery:** Serving malicious code to application users - **Privilege escalation:** Exploiting admin accounts via persistent scripts - **Content manipulation:** Altering displayed application data - **Reputation damage:** Eroding trust among users and stakeholders
Fonte⚠️ https://github.com/marcelomulder/CVE/blob/main/i-educar/Cross-Site%20Scripting%20(XSS)%20Stored%20endpoint%20%60.usuarios.tipos.(ID)%60%20parameters%20%60Tipos%20de%20Usu%C3%A1rio%60,%20%60Descri%C3%A7%C3%A3o%60.md
Utilizador
 marceloQz (UID 87549)
Submissão29/08/2025 16h34 (há 8 meses)
Moderação07/09/2025 13h45 (9 days later)
EstadoAceite
Entrada VulDB323022 [Portabilis i-Educar até 2.10 /usuarios/tipos/ Tipos de Usuário/Descrição Script de Site Cruzado]
Pontos20

Do you know our Splunk app?

Download it now for free!