Yahei-PHP Prober v0.4.7 (speed) Remote HTML Injection Vulnerability
Title: Yahei-PHP Prober v0.4.7 (speed) Remote HTML Injection Vulnerability
Advisory ID: ZSL-2019-5531
Type: Local/Remote
Impact: Cross-Site Scripting
Risk: (3/5)
Release Date: 24.07.2019
--------------------------------------------------------------------------------
--------------------------------------------------------------------------------
nginx/1.14.0
PHP/7.2.11
[2] https://cxsecurity.com/issue/WLB-2019070132
[3] https://exchange.xforce.ibmcloud.com/vulnerabilities/164412
[02.08.2019] - Added reference [1], [2] and [3]
Web: http://www.zeroscience.mk
e-mail: lab@zeroscience.mk
Advisory ID: ZSL-2019-5531
Type: Local/Remote
Impact: Cross-Site Scripting
Risk: (3/5)
Release Date: 24.07.2019
Summary
Detection of system web server operating environment.Description
Input passed to the GET parameter 'speed' is not properly sanitised before being returned to the user. This can be exploited to execute arbitrary HTML code in a user's browser session in context of an affected site.--------------------------------------------------------------------------------
/prober.php:
--------------
206: elseif(isset($_GET['speed']) and $_GET['speed']>0)
207: {
208: $speed=round(100/($_GET['speed']/1000),2);
209: }
...
...
1393: <?php echo (isset($_GET['speed']))?"Download 1000KB Used <font color='#cc0000'>".$_GET['speed']."</font> Millisecond, Download Speed: "."<font color='#cc0000'>".$speed."</font>"." kb/s":"<font color='#cc0000'> No Test </font>" ?>
--------------------------------------------------------------------------------
Vendor
Yahei.Net - http://www.yahei.netAffected Version
0.4.7Tested On
OneinStack (Linux 3.10.0-862.14.4.el7.x86_64)nginx/1.14.0
PHP/7.2.11
Vendor Status
N/APoC
php_probe_htmli.txtCredits
Vulnerability discovered by Gjoko Krstic - <gjoko@zeroscience.mk>References
[1] https://packetstormsecurity.com/files/153756[2] https://cxsecurity.com/issue/WLB-2019070132
[3] https://exchange.xforce.ibmcloud.com/vulnerabilities/164412
Changelog
[24.07.2019] - Initial release[02.08.2019] - Added reference [1], [2] and [3]
Contact
Zero Science LabWeb: http://www.zeroscience.mk
e-mail: lab@zeroscience.mk