You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Hi, there is a xss vulnerability in websoccer/admin/forgot-password.php. At line 129, The $_POST['inputEmail'] is inserted into the value attribute of <input> tag and is escaped by escapeOutput, which is actually employs htmlspecialchars($message, ENT_COMPAT, 'UTF-8') at line 30 of websoccer/admin/functions.inc.php. However, htmlspecialchars doesn't escape ' without the ENT_QUOTES flag. Therefore, an attacker can still exploit this by using ' to break out of value attribute and inject other attributes within malicious Javascript code. This allows attackers to obtain cookies of administrator and other users and fake their login using obtained cookies.
Hi, there is a xss vulnerability in
websoccer/admin/forgot-password.php
. At line 129, The$_POST['inputEmail']
is inserted into the value attribute of<input>
tag and is escaped byescapeOutput
, which is actually employshtmlspecialchars($message, ENT_COMPAT, 'UTF-8')
at line 30 ofwebsoccer/admin/functions.inc.php
. However,htmlspecialchars
doesn't escape'
without theENT_QUOTES
flag. Therefore, an attacker can still exploit this by using'
to break out of value attribute and inject other attributes within malicious Javascript code. This allows attackers to obtain cookies of administrator and other users and fake their login using obtained cookies.The POC is as follows:
Create a malicious webpage designed to inject JavaScript code into the target page(http://xxxx/admin/forgot-password.php):
When the victim visits this malicious page, the javascript code will be executed under the target page.
The text was updated successfully, but these errors were encountered: