Vulnerability CVE-2022-1439


Published: 2022-04-22

Description:
Reflected XSS on demo.microweber.org/demo/module/ in GitHub repository microweber/microweber prior to 1.2.15. Execute Arbitrary JavaScript as the attacked user. It's the only payload I found working, you might need to press "tab" but there is probably a paylaod that runs without user interaction.

Type:

CWE-79

(Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting'))

CVSS2 => (AV:N/AC:M/Au:N/C:N/I:P/A:N)

CVSS Base Score
Impact Subscore
Exploitability Subscore
4.3/10
2.9/10
8.6/10
Exploit range
Attack complexity
Authentication
Remote
Medium
No required
Confidentiality impact
Integrity impact
Availability impact
None
Partial
None
Affected software
Microweber -> Microweber 

 References:
https://huntr.dev/bounties/86f6a762-0f3d-443d-a676-20f8496907e0
https://github.com/microweber/microweber/commit/ad3928f67b2cd4443f4323d858b666d35a919ba8

Copyright 2024, cxsecurity.com

 

Back to Top