Advisory Details:
Multiple Cross-Site Scripting (XSS) were discovered in “ESP8266 WiFi File Manager latest version”, which can be exploited to execute arbitrary code.
The vulnerabilities exist due to insufficient filtration of user-supplied data in multiple parameters passed to the “ESP8266_WiFi_File_Manager-master/PHP_files/send_Dofile.php” URL. An attacker could execute arbitrary HTML and script code in a browser in the context of the vulnerable website.
The exploitation examples below use the "alert()" JavaScript function to see a pop-up messagebox:
Poc:
(1)
Post:IP= ><
To
http://localhost/.../ESP8266_WiFi_File_Manager-master/PHP_files/send_Dofile.php.php
(2)
Post: filename=><
To
http://localhost/.../ESP8266_WiFi_File_Manager-master/PHP_files/send_Dofile.php.php
Product: ESP8266 WiFi File Manager Download: https://github.com/breagan/ESP8266_WiFi_File_Manager Vunlerable Version: latest version Tested Version: latest version Author: ADLab of Venustech
Advisory Details: Multiple Cross-Site Scripting (XSS) were discovered in “ESP8266 WiFi File Manager latest version”, which can be exploited to execute arbitrary code. The vulnerabilities exist due to insufficient filtration of user-supplied data in multiple parameters passed to the “ESP8266_WiFi_File_Manager-master/PHP_files/send_Dofile.php” URL. An attacker could execute arbitrary HTML and script code in a browser in the context of the vulnerable website. The exploitation examples below use the "alert()" JavaScript function to see a pop-up messagebox: Poc: (1) Post:IP= >< To http://localhost/.../ESP8266_WiFi_File_Manager-master/PHP_files/send_Dofile.php.php (2) Post: filename=>< To http://localhost/.../ESP8266_WiFi_File_Manager-master/PHP_files/send_Dofile.php.php