Skip to content

Stored XSS In Funboot V1.1 #2

@QDming

Description

@QDming

Vulnerability Product:funboot
Vulnerability version: v1.1
Vulnerability type: Stored XSS
Vulnerability Details:

<script>alert(document.cookie)</script>

the Stored XSS payload could let admin causes disclosure of cookies、root path of websites、variables of PHP and stuff

  1. First, log in: https://www.funboot.net/backend/site/login
    Default account: test
    Default password: 123456
    image

  2. After logging in, create a message here in the message list
    image

  3. When creating a message, users, titles, and content can be selected

It is found that the title can construct malicious code storage type XSS to obtain user information and access it through the network
image

  1. Clicking on 'sent' will reveal the pop-up cookie information
    image

Prove the existence of stored xss

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions