Countly Cross Site Scripting

2018.08.21
Credit: Sleepy
Risk: Low
Local: No
Remote: Yes
CVE: N/A
CWE: CWE-79

############################################################################ # Exploit Title: Countly-server Stored(Persistent) XSS Vulnerability # Date: Monday - 2018 13 August # Author: 10:10AM Team # Discovered By: Sleepy # Software Link: https://github.com/Countly/countly-server # Version: All Version # Category: Web-apps # Security Risk: Critical # Tested on: GNU/Linux Ubuntu 16.04 - win 10 ############################################################################ # Exploit: # Description: # # Attacker can use multiple parameters in the provided link to inject his own data in the database # of this application,the injected data can then be directly viewed in the event logs panel # (manage>logger). # Attacker may use this vulnerability to inject his own payload for attacks like Stored XSS. # The injected payload will be executed everytime that the target page gets visited/refreshed. # # Proof of Concept: # # Injection URL: # # i?1/2 http://[server_ip]:[api_port]/i?api_key=[api_key]&parameter_1=[payload_1]&parameter_2=[payload_2]&etc... # # Execution URL(login to server dashboard and navigate to "event logs" panel): # # i?1/2 http://[server_ip]:[server_port]/dashboard#/[app_key]/manage/logger # # ############################################################################ # WE ARE: Sleepy({ssleeppyy@gmail.com}), Mikili({mikili.land@gmail.com}) ############################################################################


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top