# Gnuboard6 Stored XSS
### Vulnerability:Stored XSS (CWE-79)
### Severity:High
### Summary:
This stored XSS vulnerability was discovered in the latest version of GnuBoard6. When registered users bookmark and reply to any post on the message board, user input is not properly sanitized, and the reply content is not encoded when displayed. This allows attackers to inject arbitrary JavaScript code, targeting all users who can access the post. Attackers can exploit this vulnerability to steal user cookies, launch phishing attacks, and other malicious activities.
### Details:
```
Taint source:
/bbs/scrap_popin_update/qa/{post_id}
```

```
Taint sink:
/board/qa/{post_id}
```

### POC:
```
1.Register an account and log in
2.Access to http://127.0.0.1:8000/board/qa
```

```
3.send a post on http://127.0.0.1:8000/board/write/qa, any title and content
```

```
4.Access to the latest post http://127.0.0.1:8000/board/qa/1,click the "Save" button
```

```
5.Inject following XSS payload and save it
</textarea><img src=1 onerror=alert(/XSS/)>
```

```
6. XSS payload will be executed when access to the page again:
```

### Vulnerability:Stored XSS (CWE-79)
### Severity:High
### Summary:
This stored XSS vulnerability was discovered in the latest version of GnuBoard6. When registered users bookmark and reply to any post on the message board, user input is not properly sanitized, and the reply content is not encoded when displayed. This allows attackers to inject arbitrary JavaScript code, targeting all users who can access the post. Attackers can exploit this vulnerability to steal user cookies, launch phishing attacks, and other malicious activities.
### Details:
```
Taint source:
/bbs/scrap_popin_update/qa/{post_id}
```

```
Taint sink:
/board/qa/{post_id}
```

### POC:
```
1.Register an account and log in
2.Access to http://127.0.0.1:8000/board/qa
```

```
3.send a post on http://127.0.0.1:8000/board/write/qa, any title and content
```

```
4.Access to the latest post http://127.0.0.1:8000/board/qa/1,click the "Save" button
```

```
5.Inject following XSS payload and save it
</textarea><img src=1 onerror=alert(/XSS/)>
```

```
6. XSS payload will be executed when access to the page again:
```

댓글 1개
NinjaGPT
4개월 전
https://sir.kr/g6_issues/325
게시글 목록
| 번호 | 제목 |
|---|---|
| 329 | |
| 326 | |
| 325 | |
| 324 | |
| 323 | |
| 319 | |
| 318 | |
| 314 | |
| 313 | |
| 310 | |
| 309 | |
| 307 | |
| 306 | |
| 305 | |
| 304 | |
| 303 | |
| 302 | |
| 301 | |
| 300 | |
| 299 |
댓글 작성
댓글을 작성하시려면 로그인이 필요합니다.
로그인하기