-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathXSS_title_email.txt
25 lines (18 loc) · 1.92 KB
/
XSS_title_email.txt
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
[Vulnerability] simpletouchsoftware boxingtimerpro
Hello,
i am contacting you because i found a vulnerability in your Boxing Timer Pro.
I am a developer and security researcher, I use your application regularly and yesterday I found a vulnerability in your application. The vulnerability is Cross-Site-Scripting (XSS) reflected in the page title. This vulnerability is very easy to exploit (example (open this URL in your web browser): https://www.simpletouchsoftware.com/timers/boxingtimerpro/?name=</title><script>alert("Demontration: XSS Reflected... You are hacked !")</script>&rounds=45&prep=56&round=2&warning=25&rest=89).
What about the severity of the vulnerability:
1. CRITICAL: If you have an admin page on simpletouchsoftware.com, a hacker can steal your session and use the admin features and permissions on your server.
2. HIGHT: If you have an authentication system on simpletouchsoftware.com, a hacker can steal a user session and spoof their account.
3. MEDIUM: [no conditions] a hacker can use your website to control your users' web browser. It can exploit a Cross-Site-Request-Forgery (CSRF) vulnerability on another website or implement a redirect on a phishing URL from your web application (and your users will see your application as an un trusted or malicious website).
Best regards,
Maurice LAMBERT.
Contact: contact@chrisbiron.com, amber@simpletouchsoftware.com
Date: 2021-10-26
Version (iOS): 2.2.4
Payload: https://www.simpletouchsoftware.com/timers/boxingtimerpro/?name=</title><script>alert("Demontration: XSS Reflected... You are hacked !")</script>&rounds=5&prep=10&round=150&warning=10&rest=75
Protection:
- PHP: <title><?php echo htmlspecialchars($title); ?></title>
- NodeJS: const escape = str => str.replace(/&/g, '&').replace(/</g, '<').replace(/>/g, '>').replace(/'/g, "'").replace(/"/g, '"'); `<title>${escape(title)}</title>`
- python: f"<title>{html.escape(title)}</title>"