Insert JS into logs via username field
Brought to you by:
adamfranco
To exploit persistent Cross Site Scripting, Rapid7 entered the following information within the login
page:
Username: <script>alert(‘xss’)</script>
Password: passwd
Next, we logged into Segue2 as an administrator and open the “Browse Logs” page for Harmoni. Below
is a screenshot of the page:
This attack can be used in gaining administrator privileges on the Segue2 system. An attacker only needs
to perform a GET request with the administrator’s session information with the request and then review
the web server logs to extract the information.
Found during Rapid7 security audit.
Logged In: YES
user_id=789554
Originator: YES
Fixed in Harmoni 1.4.7/Segue 2.0-Beta 30.
Logs are no longer a vector for XSS injection/persistence.