SIAKAD STEKOM - Stored XSS Vulnerability(Login Page)
SIAKAD STEKOM登录页面的页脚输入存在存储型XSS漏洞,攻击者可注入恶意JavaScript脚本,导致敏感信息泄露或执行恶意操作。修复建议包括输出编码、输入消毒和实施CSP。 2025-5-24 19:41:17 Author: cxsecurity.com(查看原文) 阅读量:26 收藏

# Exploit Title: SIAKAD STEKOM - Stored XSS Vulnerability in Footer # Date: 2025-05-22 # Exploit Author: 6ickzone ([email protected]) # Vendor Homepage: https://www.stekom.ac.id/ # Software Link: https://siakad2.stekom.ac.id/loginsiakad/login # Category: Webapps # CVE: N/A # CWE: CWE-79 ## Description: A stored XSS vulnerability was discovered on the login page of SIAKAD STEKOM (https://siakad2.stekom.ac.id/loginsiakad/login), specifically within the footer text input. Malicious JavaScript payloads can be injected and stored, which will be executed every time the page is loaded, potentially compromising cookies or session tokens. # Vulnerable Parameter: Username field on the login page (https://siakad2.stekom.ac.id/loginsiakad/login) # Payload: ## Payload (Proof of Concept): "><svg/onload=alert('XSS')> ## Impact: - Cookie/session hijacking - Redirection to malicious websites - Phishing attacks on users/admins ## Recommendation: - Apply output encoding on all dynamic content (footer section). - Sanitize inputs before storage. - Implement Content Security Policy (CSP). ## Tested On: - Chrome v123 - Firefox v120

References:

https://siakad2.stekom.ac.id/loginsiakad/login




 

Thanks for you comment!
Your message is in quarantine 48 hours.


文章来源: https://cxsecurity.com/issue/WLB-2025050045
如有侵权请联系:admin#unsafe.sh