Reflected XSS in Path Traversal detector in azuracast/azuracast
Reported on
Apr 20th 2023
Description
Azuracast has a feature that block all Path Traversal tentative (good job implementing it). But when azuracast block an attack reflect the path without sanitize the output (PathTraversalDetected.php).
It is possibile to do attack like Reflected XSS or HTML injection.
#Step to reproduce
- [1] Prepare the link and send it to the victim (an admin)
- [2] If the admin open the link the XSS is fired
Proof of Concept (just navigate the link)
http://<YORSITE>/api/station/1/files/download?file=../a.png%3Cscript%3Ealert(document.cookie)%3C/script%3E
Small note: this attack can be chained to another vulnerability (about an RCE) , in order to gain a One Click Remote code execution (https://huntr.dev/bounties/a4afda09-5f76-4c55-b3c0-9431e9af653b).
I hope i was helpful.
Impact
This vulnerability allows attackers to hijack the user's current session, steal relevant information, deface website or direct users to malicious websites and allows attacker to use for further exploitation.
Valid issue. Thank you for the report! Fixed in the latest Rolling Release.