<?xml version="1.0" encoding="utf-8"?>
<feed xml:lang="en" xmlns="http://www.w3.org/2005/Atom"><title>Recent changes to 496: Cross-site scripting (XSS) Stored in Usermin's "Manage Folders" and "Address Book"</title><link href="https://sourceforge.net/p/webadmin/usermin-bugs/496/" rel="alternate"/><link href="https://sourceforge.net/p/webadmin/usermin-bugs/496/feed.atom" rel="self"/><id>https://sourceforge.net/p/webadmin/usermin-bugs/496/</id><updated>2022-06-10T20:33:16.663000Z</updated><subtitle>Recent changes to 496: Cross-site scripting (XSS) Stored in Usermin's "Manage Folders" and "Address Book"</subtitle><entry><title>#496 Cross-site scripting (XSS) Stored in Usermin's "Manage Folders" and "Address Book"</title><link href="https://sourceforge.net/p/webadmin/usermin-bugs/496/?limit=25#95d3" rel="alternate"/><published>2022-06-10T20:33:16.663000Z</published><updated>2022-06-10T20:33:16.663000Z</updated><author><name>Ilia</name><uri>https://sourceforge.net/u/iliajie/</uri></author><id>https://sourceforge.netda38cddf95d70019aad035e9b62d62f3172434b7</id><summary type="html">&lt;div class="markdown_content"&gt;&lt;p&gt;Thanks, Renan for reporting this. I have just &lt;a class="" href="https://github.com/webmin/usermin/commit/3cb4da9fee66ca834634452865692f99dad358fd" rel="nofollow"&gt;fixed&lt;/a&gt; that.&lt;/p&gt;
&lt;p&gt;Although, these are harmless, as referer check would block all requests to files in question.&lt;/p&gt;&lt;/div&gt;</summary></entry><entry><title>#496 Cross-site scripting (XSS) Stored in Usermin's "Manage Folders" and "Address Book"</title><link href="https://sourceforge.net/p/webadmin/usermin-bugs/496/?limit=25#8fb1" rel="alternate"/><published>2022-06-10T06:17:19.394000Z</published><updated>2022-06-10T06:17:19.394000Z</updated><author><name>Jamie Cameron</name><uri>https://sourceforge.net/u/jcameron/</uri></author><id>https://sourceforge.netbdb64462cb884460b47744a6a4aed188f159df7e</id><summary type="html">&lt;div class="markdown_content"&gt;&lt;p&gt;For the issue with &lt;code&gt;list_folders.cgi&lt;/code&gt; , what was the full URL that triggers the issue? It's cut off in your screenshot..&lt;/p&gt;&lt;/div&gt;</summary></entry><entry><title>#496 Cross-site scripting (XSS) Stored in Usermin's "Manage Folders" and "Address Book"</title><link href="https://sourceforge.net/p/webadmin/usermin-bugs/496/?limit=25#afb3/8982" rel="alternate"/><published>2022-06-10T05:01:20.968000Z</published><updated>2022-06-10T05:01:20.968000Z</updated><author><name>Ilia</name><uri>https://sourceforge.net/u/iliajie/</uri></author><id>https://sourceforge.net15d44d01c2f379e018f3254dc70798939dfa598a</id><summary type="html">&lt;div class="markdown_content"&gt;&lt;p&gt;Hi,&lt;/p&gt;
&lt;p&gt;In my opinion, this XSS vulnerability could be used with a CSRF vulnerability (if found).&lt;br/&gt;
An attacker could send a HTML page to the victim that execute a automatic/hidden POST request.&lt;/p&gt;
&lt;p&gt;Enviado via e-mail seguro de &lt;a class="" href="https://proton.me/" rel="nofollow"&gt;Proton Mail&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;------- Original Message -------&lt;br/&gt;
Em quinta-feira, 9 de junho de 2022 às 7:58 PM, Ilia &lt;a href="mailto:iliajie@users.sourceforge.net"&gt;iliajie@users.sourceforge.net&lt;/a&gt; escreveu:&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;Thanks for reporting this. We will look into fixing this.&lt;/p&gt;
&lt;p&gt;Although, can you think of a real life exploitation of this bug, when this attack could actually be perpetrated agaist another user?&lt;/p&gt;
&lt;hr/&gt;
&lt;p&gt;&lt;a class="" href="https://sourceforge.net/p/webadmin/usermin-bugs/496/"&gt;usermin-bugs:#496&lt;/a&gt; Cross-site scripting (XSS) Stored in Usermin's "Manage Folders" and "Address Book"&lt;/p&gt;
&lt;p&gt;Status: open&lt;br/&gt;
Group: 1.840&lt;br/&gt;
Created: Thu Jun 09, 2022 01:45 AM UTC by Renan&lt;br/&gt;
Last Updated: Thu Jun 09, 2022 01:45 AM UTC&lt;br/&gt;
Owner: Jamie Cameron&lt;/p&gt;
&lt;p&gt;Cross-site scripting (XSS) Stored in "Manage Folders" in Webmin Usermin version 1.840, which allow remote attackers to inject arbitrary web script or HTML via the "Folder Name" input.&lt;/p&gt;
&lt;p&gt;Another Cross-site scripting (XSS) Stored in "Address Book" in Webmin Usermin version 1.840, which allow remote attackers to inject arbitrary web script or HTML via the "Address Book's Real Name" input.&lt;/p&gt;
&lt;hr/&gt;
&lt;p&gt;Sent from sourceforge.net because you indicated interest in &lt;a href="https://sourceforge.net/p/webadmin/usermin-bugs/496/"&gt;https://sourceforge.net/p/webadmin/usermin-bugs/496/&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;To unsubscribe from further messages, please visit &lt;a href="https://sourceforge.net/auth/subscriptions/"&gt;https://sourceforge.net/auth/subscriptions/&lt;/a&gt;&lt;/p&gt;
&lt;/blockquote&gt;&lt;/div&gt;</summary></entry><entry><title>#496 Cross-site scripting (XSS) Stored in Usermin's "Manage Folders" and "Address Book"</title><link href="https://sourceforge.net/p/webadmin/usermin-bugs/496/?limit=25#afb3" rel="alternate"/><published>2022-06-09T22:58:06.607000Z</published><updated>2022-06-09T22:58:06.607000Z</updated><author><name>Ilia</name><uri>https://sourceforge.net/u/iliajie/</uri></author><id>https://sourceforge.net89b26e4d561a2ee34356509aac0d3ea2430a786f</id><summary type="html">&lt;div class="markdown_content"&gt;&lt;p&gt;Thanks for reporting this. We will look into fixing this.&lt;/p&gt;
&lt;p&gt;Although, can you think of a real life exploitation of this bug,  when this attack could actually be perpetrated agaist another user?&lt;/p&gt;&lt;/div&gt;</summary></entry><entry><title>Cross-site scripting (XSS) Stored in Usermin's "Manage Folders" and "Address Book"</title><link href="https://sourceforge.net/p/webadmin/usermin-bugs/496/" rel="alternate"/><published>2022-06-09T01:45:41.570000Z</published><updated>2022-06-09T01:45:41.570000Z</updated><author><name>Renan</name><uri>https://sourceforge.net/u/nullarmor/</uri></author><id>https://sourceforge.net8166b8891c7c0dbac009a992875010fc6f72a3bf</id><summary type="html">&lt;div class="markdown_content"&gt;&lt;p&gt;Cross-site scripting (XSS) Stored in "Manage Folders" in Webmin Usermin version 1.840, which allow remote attackers to inject arbitrary web script or HTML via the "Folder Name" input. &lt;/p&gt;
&lt;p&gt;Another Cross-site scripting (XSS) Stored in "Address Book" in Webmin Usermin version 1.840, which allow remote attackers to inject arbitrary web script or HTML via the "Address Book's Real Name" input. &lt;/p&gt;
&lt;p&gt;&lt;img alt="" rel="nofollow" src="https://i.imgur.com/Nhz1yKG.png"/&gt;&lt;br/&gt;
&lt;img alt="" rel="nofollow" src="https://i.imgur.com/72VMys5.png"/&gt;&lt;/p&gt;&lt;/div&gt;</summary></entry></feed>