Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

RageFrame2 2.6.43 has a reflective XSS vulnerability #113

Open
Hebing123 opened this issue Mar 21, 2024 · 0 comments
Open

RageFrame2 2.6.43 has a reflective XSS vulnerability #113

Hebing123 opened this issue Mar 21, 2024 · 0 comments

Comments

@Hebing123
Copy link

Hebing123 commented Mar 21, 2024

Summary

RageFrame2 2.6.43 has a reflective cross-site scripting (XSS) vulnerability. An attacker can execute malicious code in the admin's browser by inducing the admin to click on a link containing malicious code.

Details

RageFrame2 2.6.43 does not sufficiently filter the boxid parameter, allowing an attacker to insert arbitrary html code by prematurely ending the script tag with the </script> closing.

Proof of Concept (POC)

http://your-ip/backend/file/selector?boxId=1</script><script>alert(%27test%27)</script>&multiple=0&upload_drive=local&upload_type=images
image

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant