| Название | Portabilis i-diario 1.5.0 Cross Site Scripting (XSS) Stored |
|---|
| Описание | Cross-Site Scripting (XSS) Stored endpoint '/registros-de-conteudos-por-areas-de-conhecimento/[ID]' in multiples parameters
### Summary
A Stored Cross-Site Scripting (XSS) vulnerability was identified in the `/registros-de-conteudos-por-areas-de-conhecimento/[ID]` endpoint of the i-diario application. This vulnerability allows attackers to inject malicious scripts into `multiples parameters`. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk.
### Details
Vulnerable Endpoint: `//registros-de-conteudos-por-areas-de-conhecimento/[ID] `
Parameter: `Registro de atividades, Conteúdos`
The application fails to properly validate and sanitize user inputs in the `Registro de atividades, Conteúdos` parameters. This lack of validation allows attackers to inject malicious scripts, which are then stored on the server. Whenever the affected page is accessed, the malicious payload is executed in the victim's browser, potentially compromising the user's data and system.
### PoC
Payload: `<script>alert('PoC-XXS2')</script>`
1 - Insert the payload in the Parecer parameter.
2 - Save it
3 - Go to the option "Histórico"
![[Pasted image 20250702164408.png]]
### Impact
- Stealing session cookies: Attackers can use stolen session cookies to hijack a user's session and perform actions on their behalf.
- Downloading malware: Attackers can trick users into downloading and installing malware on their computers.
- Hijacking browsers: Attackers can hijack a user's browser or deliver browser-based exploits.
- Stealing credentials: Attackers can steal a user's credentials.
- Obtaining sensitive information: Attackers can obtain sensitive information stored in a user's account or in their browser.
- Defacing websites: Attackers can deface a website by altering its content.
- Misdirecting users: Attackers can change the instructions given to users who visit the target website, misdirecting their behavior.
- Damaging a business's reputation: Attackers can damage a business's image or spread misinformation by defacing a corporate website. |
|---|
| Источник | ⚠️ https://github.com/marcelomulder/CVE/blob/main/i-diario/Stored%20XSS%20endpoint%20registros-de-conteudos-por-areas-de-conhecimento.(ID)%20in%20multiples%20parameters.md |
|---|
| Пользователь | marceloQz (UID 87549) |
|---|
| Представление | 30.07.2025 20:38 (9 месяцы назад) |
|---|
| Модерация | 09.08.2025 07:11 (9 days later) |
|---|
| Статус | принято |
|---|
| Запись VulDB | 319314 [Portabilis i-Diario до 1.5.0 Registro das atividades registros-de-conteudos-por-areas-de-conhecimento Registro de atividades/Conteúdos межсайтовый скриптинг] |
|---|
| Баллы | 20 |
|---|