Procuct: ThinkUp
Download: https://github.com/ThinkUpLLC/ThinkUp
Vunlerable Version: lastest version
Tested Version: lastest version
Author: ADLab of Venustech
Advisory Details:
I have discovered a Cross-Site Scripting (XSS) in ThinkUp, which can be exploited to execute arbitrary code.
The vulnerability exists due to insufficient filtration of user-supplied data in “headline” HTTP GET parameter passed to “ThinkUp-master/webapp/insight_creator.php” url. An attacker could execute arbitrary HTML and script code in browser in context of the vulnerable website.
The exploitation examples below uses the "alert()" JavaScript function to see a pop-up messagebox:
Poc:
http://localhost/teststh4/ThinkUp-master/ThinkUp-master/webapp/insight_creator.php?headline=%22%3E%3Cscript%3Ealert(1);%3C/script%3E%3C%22
Procuct: ThinkUp Download: https://github.com/ThinkUpLLC/ThinkUp Vunlerable Version: lastest version Tested Version: lastest version Author: ADLab of Venustech
Advisory Details: I have discovered a Cross-Site Scripting (XSS) in ThinkUp, which can be exploited to execute arbitrary code. The vulnerability exists due to insufficient filtration of user-supplied data in “headline” HTTP GET parameter passed to “ThinkUp-master/webapp/insight_creator.php” url. An attacker could execute arbitrary HTML and script code in browser in context of the vulnerable website. The exploitation examples below uses the "alert()" JavaScript function to see a pop-up messagebox: Poc: http://localhost/teststh4/ThinkUp-master/ThinkUp-master/webapp/insight_creator.php?headline=%22%3E%3Cscript%3Ealert(1);%3C/script%3E%3C%22