header-logo
Suggest Exploit
vendor:
Subrion
by:
Min Ko Ko (Creatigon)
5.4
CVSS
MEDIUM
Cross-Site Scripting (XSS)
79
CWE
Product Name: Subrion
Affected Version From: 4.2.1
Affected Version To: 4.2.1
Patch Exists: YES
Related CWE: CVE-2019-17225
CPE: 2.3:a:subrion:subrion:4.2.1
Metasploit: N/A
Other Scripts: N/A
Platforms Tested: None
2019

Subrion 4.2.1 – ‘Email’ Persistant Cross-Site Scripting

Allows XSS via the panel/members/ Username, Full Name, or Email field, aka an 'Admin Member JSON Update' issue. First login the panel with user credential, Go to member tag from left menu. http://localhost/panel/members/ Username, Full Name, Email are editable with double click on it. Insert the following payload <img src=x onerror=alert(document.cookie)>

Mitigation:

Ensure that user input is properly sanitized and validated before being used in the application.
Source

Exploit-DB raw data:

# Title: Subrion 4.2.1 - 'Email' Persistant Cross-Site Scripting
# Date: 2019-10-07
# Author: Min Ko Ko (Creatigon)
# Vendor Homepage: https://subrion.org/
# CVE : https://nvd.nist.gov/vuln/detail/CVE-2019-17225
# Website : https://l33thacker.com
# Description :  Allows XSS via the panel/members/ Username, Full Name, or
# Email field, aka an "Admin Member JSON Update" issue.

First login the panel with user credential, Go to member tag from left menu.

http://localhost/panel/members/

Username, Full Name, Email are editable with double click on it. Insert the
following payload

<img src=x onerror=alert(document.cookie)>