[CVE-2022–34966] OSSN 6.3 LTS — HTML injection Vulnerability at location parameter
OpenTeknik LLC OSSN OPEN SOURCE SOCIAL NETWORK v6.3 LTS was discovered to contain an HTML injection vulnerability via the location parameter.
An attacker can send HTML code through any vulnerable form field to change the design of the website or any information displayed to the user, saving the information persistently on the site (e.g. database). As a result, the user will see the data sent by the attacker every time he calls up the vulnerable page.
- POST /ossn/action/wall/post/u?ossn_ts=1656581755&ossn_token=872b18aaf91ff57aa45cf78c14145534d6b84a10a3d2dc42785cbd01b04a4b38
- OSSN v6.3 LTS (https://github.com/opensource-socialnetwork/opensource-socialnetwork/releases/tag/6.3)
- Google Chrome Version 103.0.5060.114 (Official Build) (64-bit)
Steps to attack:
- First we Login to the application with username and password. (If you don’t have an account, you can register)
2. After logging into the application then we click on location button as show in the picture .
3. These fields are vulnerable to stored HTML injection, as shown below and then click post tab in bottom line.
4. As can be seen from the following evidence, the content of the injection was correctly saved on the page and executed each time the analytical driver in question is searched or called up internally by the application.
Finally!, We get the HTML Injection on Post page .
Bonus payload 😁
<marquee BODY ONSTART=alert('Grim-The-Ripper-Team-by-SOSECURE-Thailand')>=(◕_◕)=
Grim The Ripper Team by SOSECURE Thailand