Stored XSS - allows stealing Admin and Users Cookies in thorsten/phpmyfaq

Valid

Reported on

Jan 23rd 2023


Dear Ladies and Gentlemen,

First of all thank you for your time and effort in reading my Report.

While doing the Penetration Test my Brother Ahmed Hassan (hassanahmed8199@gmail.com) and I were able to identify a stored XSS Cross-Site-Scripting Vulnerability.

The Process of the Vulnerability:

Login
Go to https://roy.demo.phpmyfaq.de/admin/?action=instances
Type any kind of Javascript Code like <script>alert(‘1’)</script>
The Attacker can inject Javascript Code and steal Users and Admin Cookies to takeover their Account.

Through this, any Attacker can inject Javascript Code and use further Vulnerabilities to use other Exploitation Steps.

Finally, I want to thank you for your time and effort, and hope to hear from you soon.

Best regards Josef Hassan & Ahmed Hassan

Impact

Dear Ladies and Gentlemen,

First of all thank you for your time and effort in reading my Report.

While doing the Penetration Test my Brother Ahmed Hassan (hassanahmed8199@gmail.com) and I were able to identify a stored XSS Cross-Site-Scripting Vulnerability.

The Process of the Vulnerability:

Login
Go to https://roy.demo.phpmyfaq.de/admin/?action=instances
Type any kind of Javascript Code like <script>alert(‘1’)</script>
The Attacker can inject Javascript Code and steal Users and Admin Cookies to takeover their Account.

Through this, any Attacker can inject Javascript Code and use further Vulnerabilities to use other Exploitation Steps.

Finally, I want to thank you for your time and effort, and hope to hear from you soon.

Best regards Josef Hassan & Ahmed Hassan

References

We are processing your report and will contact the thorsten/phpmyfaq team within 24 hours. 10 months ago
We have contacted a member of the thorsten/phpmyfaq team and are waiting to hear back 10 months ago
thorsten/phpmyfaq maintainer has acknowledged this report 10 months ago
Thorsten Rinne gave praise 10 months ago
The researcher's credibility has slightly increased as a result of the maintainer's thanks: +1
Thorsten Rinne validated this vulnerability 10 months ago
josefjku has been awarded the disclosure bounty
The fix bounty is now up for grabs
The researcher's credibility has increased: +7
Thorsten Rinne marked this as fixed in 3.1.11 with commit 26663e 10 months ago
Thorsten Rinne has been awarded the fix bounty
This vulnerability has been assigned a CVE
This vulnerability is scheduled to go public on Feb 28th 2023
Thorsten Rinne published this vulnerability 10 months ago
to join this conversation