[Reflected XSS] In Request URL

Disclosed: 2020-03-01 13:18:48 By nstikhomirov To nextcloud
Low
Vulnerability Details
In [index.php file](https://github.com/nextcloud/updater/blob/master/index.php#L1765) on 1765 we can see XSS: `<a class="button" href="<?php echo str_replace('/index.php', '/../', $updaterUrl); ?>">` Because NextCloud allow links like: '/index.php/{ANY_CONTENT}' If we will do request like: ``` POST /updater/index.php/h"><script>alert(1);</script> HTTP/1.1 Host: vulns.local Content-Type: application/x-www-form-urlencoded Content-Length: 33 updater-secret-input={OUR_SECRET} ``` We will see Reflected XSS: F452129 To fix this vulnerability need to patch `<a class="button" href="<?php echo str_replace('/index.php', '/../', $updaterUrl); ?>">` to `<a class="button" href="<?php echo htmlspecialchars(str_replace('/index.php', '/../', $updaterUrl), ENT_QUOTES); ?>">` ## Impact If the attacker knows the secret phrase, then they can implode illegitimate html code in page
Actions
View on HackerOne
Report Stats
  • Report ID: 515484
  • State: Closed
  • Substate: resolved
  • Upvotes: 37
Share this report