Overview
in SiCKRAGE, versions 9.3.54.dev1 to 10.0.11.dev1 are vulnerable to Reflected Cross-Site-Scripting (XSS) due to user input not being validated properly in the `quicksearch` feature. Therefore, an attacker can steal a user's sessionID to masquerade as a victim user, to carry out any actions in the context of the user.
Details
The application `SiCKRAGE` is vulnerable to Reflected Cross-Site-Scripting(XSS) as the function `quicksearch` incorrectly neutralizes user-controllable input `term` before it is placed in output. Due to this flaw, an attacker can steal a user's sessionID to masquerade as a victim user, to carry out any actions in the context of the user.
PoC Details
After registering and logging in to the application, go to the `home/addShows` endpoint. Inject the given payload into the search field and observe the payload getting executed.
PoC Code
<script>alert(document.cookie)</script>
Affected Environments
9.3.54.dev1-10.0.11.dev1
Prevention
Upgrade to version 10.0.11.dev2