MK-AUTH through 19.01 K4.9 allows XSS via the admin/logs_ajax.php tipo parameter. An attacker can leverage this to read the centralmka2 (session token) cookie, which is not set to HTTPOnly.
The product specifies permissions for a security-critical resource in a way that allows that resource to be read or modified by unintended actors.
Link | Tags |
---|---|
http://mk-auth.com.br/ | vendor advisory |
https://gist.github.com/alacerda/380b8923e36a29a02ba1457c1eb3ec2f | third party advisory exploit |