Last active
June 5, 2018 14:21
-
-
Save prafagr/bd641fcfe71661065e659672c737173b to your computer and use it in GitHub Desktop.
Twonky Server 8.5 has XSS via a folder name on the Shared Folders screen
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Steps for reproduction: | |
> 1. Navigate to Setting and then move to Shared folders section. | |
> 2. Add a new folder with a name: "><img src=/ onerror=alert("XSS")> | |
> 3. Confirm the changes. | |
> 4. XSS is executed. | |
> | |
> ------------------------------------------ | |
> | |
> [Vulnerability Type] | |
> Cross Site Scripting (XSS) | |
> | |
> ------------------------------------------ | |
> | |
> [Vendor of Product] | |
> Lynx Technology | |
> | |
> ------------------------------------------ | |
> | |
> [Affected Product Code Base] | |
> TwonkyMedia Server - 8.5 | |
> | |
> ------------------------------------------ | |
> | |
> [Affected Component] | |
> TwonkyMedia Server version 8.5 | |
> | |
> ------------------------------------------ | |
> | |
> [Attack Type] | |
> Remote | |
> | |
> ------------------------------------------ | |
> | |
> [Impact Code execution] | |
> true | |
> | |
> ------------------------------------------ | |
> | |
> [Attack Vectors] | |
> I was able to locate an instance of stored cross site scripting. | |
> | |
> ------------------------------------------ | |
> [Fixed version] | |
>TwonkyMedia Server version 8.5.1 | |
> | |
> [Discoverer] | |
> Prafull Agarwal, Kiran K Nair, Priyank Sethi |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment