Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-ggwq-xc72-33r3

Опубликовано: 30 дек. 2024
Источник: github
Github: Прошло ревью
CVSS4: 5.3

Описание

LGSL has a reflected XSS at /lgsl_files/lgsl_list.php

Reflected XSS at /lgsl_files/lgsl_list.php

Description:

Vulnerability: A reflected XSS vulnerability exists in the Referer HTTP header of LGSL v6.2.1. The vulnerability allows attackers to inject arbitrary JavaScript code, which is reflected in the HTML response without proper sanitization. When crafted malicious input is provided in the Referer header, it is echoed back into an HTML attribute in the application’s response.

The vulnerability is present at Line 20-24

$uri = $_SERVER['REQUEST_URI']; if ($lgsl_config['preloader']) { $uri = $_SERVER['HTTP_REFERER']; }

Proof of Concept:

  1. Capture a request to the path /lgsl_files/lgsl_list.php.
  2. Inject the following payload into the Referer header: test'><script>alert(1)</script><.
  3. Send the request.
  4. The XSS payload is triggered when reloading. image image

Impact:

Execution of Malicious Code

Пакеты

Наименование

tltneon/lgsl

composer
Затронутые версииВерсия исправления

<= 6.2.1

Отсутствует

EPSS

Процентиль: 57%
0.00357
Низкий

5.3 Medium

CVSS4

Дефекты

CWE-79

Связанные уязвимости

nvd
около 1 года назад

LGSL (Live Game Server List) provides online status lists for online video games. Versions up to and including 6.2.1 contain a reflected cross-site scripting vulnerability in the `Referer` HTTP header. The vulnerability allows attackers to inject arbitrary JavaScript code, which is reflected in the HTML response without proper sanitization. When crafted malicious input is provided in the `Referer` header, it is echoed back into an HTML attribute in the application’s response. Commit 7ecb839df9358d21f64cdbff5b2536af25a77de1 contains a patch for the issue.

EPSS

Процентиль: 57%
0.00357
Низкий

5.3 Medium

CVSS4

Дефекты

CWE-79