Отправить #636957: Portabilis i-Educar 2.10 Cross Site ScriptingИнформация

НазваниеPortabilis i-Educar 2.10 Cross Site Scripting
ОписаниеMultiples Stored Cross-Site Scripting (XSS) in educar_projeto_cad.php Summary Multiples Stored Cross-Site Scripting (XSS) vulnerability was identified in the /intranet/educar_projeto_cad.php endpoint of the i-Educar application. This vulnerability allows attackers to inject malicious scripts into the nome and observacao parameters. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk. Details Vulnerable Endpoint: /intranet/educar_projeto_cad.php Parameter: nome, observacao Trigger Page: /intranet/educar_projeto_lst.php The application fails to properly validate and sanitize user inputs in the nome and observacao parameters. This lack of validation allows attackers to inject malicious scripts, which are then stored on the server. Whenever the affected page is accessed, the malicious payload is executed in the victim's browser, potentially compromising the user's data and system. PoC Step by Step: Access vulnerable endpoint. Insert the payload in first field ("Nome do Projeto") and second field ("Observação"). Click on "Salvar" and the trigger page will be activated automatically. Payload: "><img src=x onerror=alert('CVE-Hunters')> image 1: https://github.com/KarinaGante/KGSec/raw/main/CVEs/images/storedXss54.png image 2: https://github.com/KarinaGante/KGSec/raw/main/CVEs/images/storedXss55.png image 3: https://github.com/KarinaGante/KGSec/raw/main/CVEs/images/storedXss56.png image 4: https://github.com/KarinaGante/KGSec/raw/main/CVEs/images/storedXss57.png Impact Stealing session cookies: Attackers can use stolen session cookies to hijack a user's session and perform actions on their behalf. Downloading malware: Attackers can trick users into downloading and installing malware on their computers. Hijacking browsers: Attackers can hijack a user's browser or deliver browser-based exploits. Stealing credentials: Attackers can steal a user's credentials. Obtaining sensitive information: Attackers can obtain sensitive information stored in a user's account or in their browser. Defacing websites: Attackers can deface a website by altering its content. Misdirecting users: Attackers can change the instructions given to users who visit the target website, misdirecting their behavior. Damaging a business's reputation: Attackers can damage a business's image or spread misinformation by defacing a corporate website. Finder Discovered by Karina Gante.
Источник⚠️ https://github.com/KarinaGante/KGSec/blob/main/CVEs/i-educar/14.md
Пользователь
 karinagante (UID 88113)
Представление18.08.2025 20:24 (8 месяцы назад)
Модерация29.08.2025 08:54 (11 days later)
Статуспринято
Запись VulDB321861 [Portabilis i-Educar до 2.10 Cadastrar projeto Page educar_projeto_cad.php nome/observacao межсайтовый скриптинг]
Баллы20

Are you interested in using VulDB?

Download the whitepaper to learn more about our service!