Отправить #607948: Portabilis i-diario 1.5.0 Cross Site ScriptingИнформация

НазваниеPortabilis i-diario 1.5.0 Cross Site Scripting
ОписаниеA Reflected Cross-Site Scripting (XSS) vulnerability was identified in the /conteudos endpoint parameter filter[by_description]. This vulnerability allows attackers to inject malicious scripts in the filter[by_description] parameter. The application fails to validate and sanitize user inputs in the filter[by_description] parameter. This lack of validation permits the injection of malicious payloads, which are reflected back to the user's browser in the server's response and executed within the context of the victim's browser. ### PoC Payload: `"><img src=x onerror=alert('XSS-PoC')>` ![image](https://github.com/user-attachments/assets/613683a9-54e6-4136-a9c0-fb15134863bd) ![image](https://github.com/user-attachments/assets/ccaebe33-9165-41f5-b1e2-99a5e7702b26) ### Impact - User actions: Attackers can perform any action the user can, such as viewing, modifying, or initiating interactions with other users - Data theft: Attackers can exfiltrate data or install malware on the user's machine - Account compromise: Attackers can manipulate or steal cookies, or compromise confidential information - Malicious code: Attackers can execute malicious code on the user's system - Business reputation damage: Attackers can deface a corporate website or spread misinformation - Misdirection: Attackers can change the instructions given to users, which can be dangerous if the target is a government website or provides vital resources by [CVE-Hunters](https://github.com/Sec-Dojo-Cyber-House/cve-hunters)
Источник⚠️ https://github.com/nmmorette/vulnerability-research/blob/main/idiario2/README.md
Пользователь
 nmmorette (UID 87361)
Представление02.07.2025 17:38 (10 месяцы назад)
Модерация19.07.2025 07:53 (17 days later)
Статуспринято
Запись VulDB316984 [Portabilis i-Diario 1.5.0 /conteudos filter[by_description] межсайтовый скриптинг]
Баллы20

Want to stay up to date on a daily basis?

Enable the mail alert feature now!