header-logo
Suggest Exploit
vendor:
ImgHosting
by:
Dennis Veninga
6.1
CVSS
MEDIUM
Cross-Site-Scripting
79
CWE
Product Name: ImgHosting
Affected Version From: 1.5
Affected Version To: 1.5
Patch Exists: YES
Related CWE: CVE-2018-5479
CPE: a:foxsash:imghosting
Metasploit: N/A
Other Scripts: N/A
Platforms Tested: None
2018

ImgHosting Image Storage System 1.5 – Cross-Site-Scripting

ImgHosting 1.5 is vulnerable to XSS attacks. The affected function is its search engine. Since there is an user/admin login interface, it's possible for attackers to steal sessions of users and thus admin(s). By sending users an infected URL, code will be executed.

Mitigation:

Implement input validation and output encoding to prevent XSS attacks.
Source

Exploit-DB raw data:

# Exploit Title: ImgHosting Image Storage System 1.5 - Cross-Site-Scripting
# Date: 12-01-2018
# Exploit Author: Dennis Veninga
# Contact Author: d.veninga [at] networking4all.com
# Vendor Homepage: foxsash.com
# Version: 1.5
# CVE-ID: CVE-2018-5479

ImgHosting – Image Storage System quick and easy image hosting without
registration. Service is ideal for fast and reliable placement of images
for forums, blogs and websites. Simple design, comfortable customers,
direct links to pictures. This hosting service that we do every day use.
Like thousands of other people. We do service to the people.

ImgHosting 1.5 (According footer information) is vulnerable to XSS attacks.
The affected function is its search engine. Since there is an user/admin
login interface, it's possible for attackers to steal sessions of users and
thus admin(s). By sending users an infected URL, code will be executed.

---------------------------
---------------------------
PoC:

http://{TARGET}/?search="><script>confirm(document.domain)<%2Fscript>
---------------------------
---------------------------

Evil javascript code can be inserted and will be executed when visiting the link