테스트 사이트 - 개발 중인 베타 버전입니다

Stored XSS vulnerability

· 4개월 전 · 149 · 1
# Gnuboard6 Stored XSS

### Vulnerability:Stored XSS (CWE-79)
### Severity:High
### Summary:

This stored XSS vulnerability was discovered in the latest version of GnuBoard6. When registered users bookmark and reply to any post on the message board, user input is not properly sanitized, and the reply content is not encoded when displayed. This allows attackers to inject arbitrary JavaScript code, targeting all users who can access the post. Attackers can exploit this vulnerability to steal user cookies, launch phishing attacks, and other malicious activities.

### Details:
```
Taint source:
/bbs/scrap_popin_update/qa/{post_id}
```
![image](https://github.com/user-attachments/assets/efacd7c7-7d7f-4983-bbb6-993cd87b07bc)

```
Taint sink:
/board/qa/{post_id}
```
![image](https://github.com/user-attachments/assets/a1c0085e-cf6b-40a6-85d7-22c270db0767)

### POC:
```
1.Register an account and log in
2.Access to http://127.0.0.1:8000/board/qa
```
![image](https://github.com/user-attachments/assets/75fa55fe-c876-405b-acaf-e58792f8e1f6)
```
3.send a post on http://127.0.0.1:8000/board/write/qa, any title and content
```
![image](https://github.com/user-attachments/assets/94a8abe8-fc78-4d4e-95c6-cf7590eb51b5)
```
4.Access to the latest post http://127.0.0.1:8000/board/qa/1,click the "Save" button
```
![image](https://github.com/user-attachments/assets/81b0c9ea-536a-4335-b75a-c5ff4f54ce3a)

```
5.Inject following XSS payload and save it
</textarea><img src=1 onerror=alert(/XSS/)>
```
![image](https://github.com/user-attachments/assets/c2c15685-1915-450f-bdfc-cd03fa61e442)

```
6. XSS payload will be executed when access to the page again:
```
![image](https://github.com/user-attachments/assets/38145a9a-d8be-44f1-9e27-98a5f1935749)

댓글 작성

댓글을 작성하시려면 로그인이 필요합니다.

로그인하기

댓글 1개

4개월 전
https://sir.kr/g6_issues/325

게시글 목록

번호 제목
329
326
325
324
323
319
318
314
313
310
309
307
306
305
304
303
302
301
300
299