usd-2023-0011 | Reflected XSS in SuperWebMailer
Advisory ID: usd-2023-0011
Affected Version: 9.00.0.01710
Vulnerability Type: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Security Risk: MEDIUM
Vendor URL: https://www.superwebmailer.de
Vendor acknowledged vulnerability: No
Vendor Status: Not fixed
CVE number: CVE-2023-38192
CVE Link: https://nvd.nist.gov/vuln/detail/CVE-2023-38192
SuperWebMailer is an online application for managing e-mail newsletters.
An unauthenticated Cross-Site Scripting (XSS) vulnerability was discovered during an engagement.
In an XSS attack, a potentially malicious script is injected into a website.
The superadmincreate.php script is vulnerable to reflected XSS payloads.
Submitting the form with two non-identical passwords results in an error message and the submitted values being prefilled in the plain HTML without any encoding or filtering being applied.
Consequently, on submitting an XSS payload, it is executed.
Proof of Concept
POST /superadmincreate.php HTTP/2 Host: swm.example.com User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:102.0) Gecko/20100101 Firefox/102.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8 Accept-Language: en-US,en;q=0.5 Accept-Encoding: gzip, deflate Content-Type: application/x-www-form-urlencoded Content-Length: 107
It is recommended to treat all input on the website as potentially dangerous. Hence, all output that is dynamically generated based on user-controlled data should be encoded according to its context.
- 2022-09-26: This vulnerability was discovered by Florian Dewald and Gerbert Roitburd of usd AG.
- 2023-04-20: First contact request via firstname.lastname@example.org.
- 2023-05-08: Reminder sent via email@example.com and contact form.
- 2023-05-15: Second reminder to firstname.lastname@example.org and email@example.com.
- 2023-05-25: Another reminder sent to firstname.lastname@example.org, email@example.com and firstname.lastname@example.org
- 2023-06-05: Once more tried to inform the company of the vulnerabilities via the feedback form (email@example.com).
- 2023-07-17: Sent another email to firstname.lastname@example.org, email@example.com, firstname.lastname@example.org and email@example.com, stressing that CVEs are assigned to the vulnerabilities and disclosure may happen in case we do not receive an answer soon.
- 2023-08-17: As the vulnerabilities were found during a pentest, the customer was asked whether or not the Responsible Disclosure Team should move forward without the software vendor's cooperation.
- 2023-10-02: Final notice given to info@superwebmailer, warning of immenent disclosure should there be no response within a week.
- 2023-10-20: Vulnerabilities disclosed by usd AG.
This security vulnerability was identified by Florian Dewald and Gerbert Roitburd of usd AG.