Cross-site Scripting vulnerability in Ampache 4.4.2
Information
Advisory by Netsparker (now Invicti)
Name: Cross-site Scripting vulnerability in Ampache 4.4.2
Affected Software: Ampache
Affected Versions: 4.4.2
Homepage: http://ampache.org/
Vulnerability: Cross-Site Scripting
Severity: High
Status: Fixed
CVSS Score (3.0): 7.4 (High)
Invicti Advisory Reference: NS-21-003
Technical Details
Cross-site scripting in Random.php
URL: http://alihost:1134/random.php?action=get_advanced&type=%27%22%20onmouseover%3dalert(0x0002DE)%20
Parameter Name: type
Parameter Type: GET
Attack Pattern: %27%22+ns%3dnetsparker(0x0002DE)+
Vulnerability Details
Invicti detected a Cross-site Scripting vulnerability, which allows an attacker to execute a dynamic script (JavaScript, VBScript) in the context of the application.
This allows several different attack opportunities, mostly hijacking the current session of the user or changing the look of the page by changing the HTML on the fly to steal the user’s credentials. This happens because the input entered by a user has been interpreted as HTML/JavaScript/VBScript by the browser. Cross-site scripting targets the users of the application instead of the server. Although this is a limitation, since it allows attackers to hijack other users’ sessions, an attacker might attack an administrator to gain full control over the application.
For more information on cross-site scripting vulnerabilities, read the section Cross-site scripting (XSS).
Advisory Timeline
26th May 2021 – First Contact
22nd June 2021 – Vulnerability Fixed
21st July 2021 – Advisory Released
Credits & Authors
These issues have been discovered by Ali Oğuz while testing the Invicti Web Application Security Scanner.
About Invicti
Invicti Security is transforming the way web applications are secured. Invicti empowers organizations in every industry to scale their overall security operations, make the best use of their security resources, and engage developers in helping to improve their overall security posture.