Submit #648833: Portabilis i-educar 2.10 Cross Site Scripting (XSS) Reflectedinfo

TitlePortabilis i-educar 2.10 Cross Site Scripting (XSS) Reflected
Description# Cross-Site Scripting (XSS) Reflected endpoint `educar_escolaridade_lst.php` parameter `busca` --- ## Summary A Reflected Cross-Site Scripting (XSS) vulnerability was identified in the `educar_escolaridade_lst.php` endpoint of the _i-educar_ application. This vulnerability allows attackers to inject malicious scripts into the `busca` parameter. The payload is reflected in the application’s HTTP response without proper sanitization, leading to immediate execution in the victim’s browser. --- ## Details **Vulnerable Endpoint:** `GET /educar_escolaridade_lst.php` **Parameter:** `busca` The application fails to properly validate and sanitize user input in the `busca` parameter. An attacker can craft a malicious URL containing a JavaScript payload, which is reflected back in the server’s response and executed when a victim accesses the crafted link. --- ## PoC **Payload:** `"><script>alert('XSS-PoC')</script>` ### Steps to Reproduce: 1. Log in to the _i-educar_ application using an account with permissions to access 'Servidores' Menu 2. Locate a page or feature that uses the `educar_escolaridade_lst.php` endpoint and processes the `busca` parameter. (Servidores > Cadastros > Tipos > Escolaridade) 3. Modify the URL to include the payload above. For example: `/educar_escolaridade_lst.php?busca="><script>alert('XSS-PoC')</script>` <img width="1276" height="672" alt="Pasted image 20250810014353" src="https://github.com/user-attachments/assets/ea6eba9e-1656-4fa1-a847-93db3ec7ef84" /> 4. Load the crafted URL in a browser. The injected script is executed immediately, confirming the presence of the reflected XSS vulnerability. <img width="1214" height="588" alt="Pasted image 20250810014420" src="https://github.com/user-attachments/assets/e822a678-e7c1-4095-a399-58913d8a6a30" /> --- ## Impact Reflected XSS vulnerabilities can result in severe consequences, including: - **Session hijacking:** Theft of cookies or authentication tokens - **Credential theft:** Capturing sensitive user credentials via injected scripts - **Malware delivery:** Redirecting victims to malicious downloads or exploit pages - **Phishing attacks:** Displaying deceptive forms or content to steal user data - **Reputation damage:** Exploiting trust between the application and its users - **Client-side manipulation:** Altering the application’s content and behavior dynamically
Source⚠️ https://github.com/marcelomulder/CVE/blob/main/i-educar/Cross-Site%20Scripting%20(XSS)%20Reflected%20endpoint%20%60educar_escolaridade_lst.php%60%20parameter%20%60busca%60.md
User
 marceloQz (UID 87549)
Submission09/05/2025 17:26 (8 months ago)
Moderation09/17/2025 07:43 (12 days later)
StatusDuplicate
VulDB entry318342 [Portabilis i-Educar 2.9 educar_escolaridade_lst.php descricao cross site scripting]
Points0

Do you know our Splunk app?

Download it now for free!