breagan / ESP8266_WiFi_File_Manager

These files allow ESP8266 remote file management and control over WiFi
68 stars 40 forks source link

ESP8266 WiFi File Manager – Cross-Site Scripting (XSS) in “send_Restart.php” #7

Open bestshow opened 7 years ago

bestshow commented 7 years ago

Product: ESP8266 WiFi File Manager Download: https://github.com/breagan/ESP8266_WiFi_File_Manager Vunlerable Version: latest version Tested Version: latest version Author: ADLab of Venustech

Advisory Details: A Cross-Site Scripting (XSS) was discovered in “ESP8266 WiFi File Manager latest version”, which can be exploited to execute arbitrary code. The vulnerability exists due to insufficient filtration of user-supplied data in the “chipIP” HTTP POST parameter passed to the “ESP8266_WiFi_File_Manager-master/PHP_files/send_Restart.php” URL. An attacker could execute arbitrary HTML and script code in a browser in the context of the vulnerable website. The exploitation example below uses the "alert()" JavaScript function to see a pop-up messagebox: Poc: (1) Post:chipIP= >< To http://localhost/.../ESP8266_WiFi_File_Manager-master/PHP_files/send_Restart.php

bestshow commented 7 years ago

Excuse me, is there anyone dealing with this issue?