catchpoint / WebPageTest

Official repository for WebPageTest
Other
3.08k stars 715 forks source link

Webpagetest – Multiple Cross-Site Scripting (XSS) in “benchmarks/compare.php” #830

Closed bestshow closed 7 years ago

bestshow commented 7 years ago

Webpagetest – Multiple Cross-Site Scripting (XSS) in “benchmarks/compare.php” Product: webpagetest Download: https://github.com/WPO-Foundation/webpagetest Vunlerable Version: 3.0 and probably prior Tested Version: 3.0 Author: ADLab of Venustech

Advisory Details: Multiple Cross-Site Scripting (XSS) were discovered in“webpagetest 3.0”, which can be exploited to execute arbitrary code. The vulnerabilities exist due to insufficient filtration of user-supplied data in the “configs” HTTP GET/POST parameter passed to the “webpagetest-master/www/benchmarks/compare.php” URL. An attacker could execute arbitrary HTML and script code in a browser in the context of the vulnerable website. The exploitation examples below use the "alert()" JavaScript function to see a pop-up messagebox: Poc: (1) http://localhost/.../webpagetest-master/www/benchmarks/compare.php?configs=%22%3E%3Cscript%3Ealert(1);%3C/script%3E%3C%22 (2) POST: configs= ";} Githubissues.

  • Githubissues is a development platform for aggregating issues.