Skip to content

Stored Cross Site Scripting vulnerability in Microweber < 2.0.9

Notifications You must be signed in to change notification settings

MathSabo/CVE-2024-33297

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

6 Commits
 
 

Repository files navigation

CVE-2024-33297

Stored Cross Site Scripting vulnerability in Microweber <= 2.0.9

Summary :

A Stored Cross Site Scripting vulnerability in Microweber v.2.0.9 allows a remote attacker to execute arbitrary code via the campaign Name (Internal Name) field in the "Add new campaign" function.

Requirements :

Steps to reproduce :

  1. Authenticate the application with administrative privileges
  2. Go to the endpoint /admin/modules/newsletter/lists and click on "+ Add new list"
  3. Insert the payload <img src=x onerror=alert(1)> on "List name" field
  4. Click "Save" to trigger the JavaScript injection. The injection will be triggered when listing current campaigns and on the creation tab of a new subscriber too.

Affected components :

  • /admin/modules/newsletter

Impact :

An attacker could execute JavaScript code in the victim's browser, obtaining information or forcing the user to access malicious websites, for example.

Relevant References

https://www.cve.org/CVERecord?id=CVE-2024-33297

About

Stored Cross Site Scripting vulnerability in Microweber < 2.0.9

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published