Cross-site Scripting vulnerability in Ampache 4.4.2

Information

Advisory by Netsparker (now Invicti)
Name: Cross-site Scripting vulnerability in Ampache 4.4.2
Affected Software: Ampache
Affected Versions: 4.4.2
Homepage: http://ampache.org/
Vulnerability: Cross-Site Scripting
Severity: High
Status: Fixed
CVSS Score (3.0): 7.4 (High)
Invicti Advisory Reference: NS-21-003

Technical Details

Cross-site scripting in Random.php

URL: http://alihost:1134/random.php?action=get_advanced&type=%27%22%20onmouseover%3dalert(0x0002DE)%20
Parameter Name: type
Parameter Type: GET
Attack Pattern: %27%22+ns%3dnetsparker(0x0002DE)+

Vulnerability Details

Invicti detected a Cross-site Scripting vulnerability, which allows an attacker to execute a dynamic script (JavaScript, VBScript) in the context of the application.

This allows several different attack opportunities, mostly hijacking the current session of the user or changing the look of the page by changing the HTML on the fly to steal the user’s credentials. This happens because the input entered by a user has been interpreted as HTML/JavaScript/VBScript by the browser. Cross-site scripting targets the users of the application instead of the server. Although this is a limitation, since it allows attackers to hijack other users’ sessions, an attacker might attack an administrator to gain full control over the application.

For more information on cross-site scripting vulnerabilities, read the section Cross-site scripting (XSS).

Advisory Timeline

26th May 2021 – First Contact
22nd June 2021 – Vulnerability Fixed
21st July 2021 – Advisory Released

Credits & Authors

These issues have been discovered by Ali Oğuz while testing the Invicti Web Application Security Scanner.

About Invicti

Invicti Security is transforming the way web applications are secured. Invicti empowers organizations in every industry to scale their overall security operations, make the best use of their security resources, and engage developers in helping to improve their overall security posture.