CVE-2020-35930

MEDIUM5.4/ 10.0
Share:
Published: December 31, 2020 at 08:15 PM
Modified: November 21, 2024 at 05:28 AM
Source: cve@mitre.org

Vulnerability Description

Seo Panel 4.8.0 allows stored XSS by an Authenticated User via the url parameter, as demonstrated by the seo/seopanel/websites.php URI.

CVSS Metrics

Base Score
5.4
Severity
MEDIUM
Vector String
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N

Weaknesses (CWE)

Source: nvd@nist.gov

AI Security Analysis

01 // Technical Summary

Seo Panel 4.8.0 is vulnerable to a stored cross-site scripting (XSS) attack, allowing an authenticated attacker to inject malicious JavaScript code into the application. This vulnerability can lead to account compromise, data theft, and website defacement by executing arbitrary code within the context of legitimate users' browsers.

02 // Vulnerability Mechanism

Step 1: Authentication: The attacker must first authenticate to the Seo Panel application, likely by obtaining valid credentials or exploiting another vulnerability.

Step 2: Payload Injection: The attacker crafts a malicious JavaScript payload (e.g., <script>alert('XSS')</script>) and injects it into the url parameter when creating or modifying a website entry via the seo/seopanel/websites.php URI.

Step 3: Payload Storage: The application stores the injected payload in the database, without proper sanitization.

Step 4: Victim Interaction: A legitimate user, with appropriate permissions, views the website information, which includes the attacker-controlled url parameter.

Step 5: Payload Execution: The browser renders the stored url parameter, executing the malicious JavaScript payload within the user's browser context.

03 // Deep Technical Analysis

The vulnerability stems from insufficient input validation and output encoding of the url parameter within the seo/seopanel/websites.php URI. Specifically, the application fails to properly sanitize user-supplied input before storing it in the database and subsequently rendering it in the browser. This allows an attacker to inject malicious JavaScript code into the url parameter. When a legitimate user views the website information, the injected JavaScript executes within their browser, enabling the attacker to steal cookies, redirect users, or perform other malicious actions. The root cause is a lack of HTML encoding or input validation on the url parameter before storage and retrieval.

CVE-2020-35930 - MEDIUM Severity (5.4) | Free CVE Database | 4nuxd