Sahi Pro 8.0.0 has a script manager arena located at _s_/dyn/pro/DBReports with many different areas that are vulnerable to reflected XSS, by updating a script's Script Name, Suite Name, Base URL, Android, iOS, Scripts Run, Origin Machine, or Comment field. The sql parameter can be used to trigger reflected XSS.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
https://sahipro.com/downloads-archive/ | third party advisory |
https://packetstormsecurity.com/files/154985/Sahi-Pro-8.x-Cross-Site-Scripting.html | third party advisory vdb entry exploit |