icon

We found results for “

CVE-2021-25926

Date: April 12, 2021

Overview

in SiCKRAGE, versions 9.3.54.dev1 to 10.0.11.dev1 are vulnerable to Reflected Cross-Site-Scripting (XSS) due to user input not being validated properly in the `quicksearch` feature. Therefore, an attacker can steal a user's sessionID to masquerade as a victim user, to carry out any actions in the context of the user.

Details

The application `SiCKRAGE` is vulnerable to Reflected Cross-Site-Scripting(XSS) as the function `quicksearch` incorrectly neutralizes user-controllable input `term` before it is placed in output. Due to this flaw, an attacker can steal a user's sessionID to masquerade as a victim user, to carry out any actions in the context of the user.

PoC Details

After registering and logging in to the application, go to the `home/addShows` endpoint. Inject the given payload into the search field and observe the payload getting executed.

PoC Code

<script>alert(document.cookie)</script> 

Affected Environments

9.3.54.dev1-10.0.11.dev1

Prevention

Upgrade to version 10.0.11.dev2

Language: Python

Good to know:

icon
icon

Cross-Site Scripting (XSS)

CWE-79
icon

Upgrade Version

Upgrade to version 10.0.11.dev2

Learn More

Base Score:
Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): Required
Scope (S): Changed
Confidentiality (C): Low
Integrity (I): Low
Availability (A): None
Base Score:
Access Vector (AV): Network
Access Complexity (AC): Medium
Authentication (AU): None
Confidentiality (C): None
Integrity (I): Partial
Availability (A): None
Additional information: