| Kura | demtec.sk Graphlytics 5.0.7 Cross Site Scripting |
|---|
| Gaskiya | [ Reflected XSS on Graphytics v5.0.7 ]
Graphytics version 5.0.7 is vulnerable to Reflected Cross-Site Scripting (XSS), allowing attackers to execute malicious JavaScript in a victim’s browser. This can lead to session hijacking, as the application does not enforce the HttpOnly flag on session cookies, making them accessible to client-side scripts. Exploiting this vulnerability could result in unauthorized access to user sessions and sensitive information.
The issue was tested in the Dockerized version of Graphytics, following the installation guide provided at: https://graphlytic.com/doc/latest/Install_with_Docker_on_Ubuntu.html
Payload used:
http://{graphlytic-ip}:8080/visualization?name`;alert(document.cookie);`=1
Refer complete POC published on the Git repo.
Note:
If possible please add Adamya Varma ([email protected]) as co-researcher for the vulnerability |
|---|
| Manga | ⚠️ https://github.com/HexC0d3/graphlytic-xss-exploits/blob/main/reflected_xss.md |
|---|
| Màdùmga | 0xc0de (UID 83444) |
|---|
| Furta | 04/04/2025 09:15 (11 Wurɗi 전) |
|---|
| Gargajiya | 04/14/2025 23:17 (11 days later) |
|---|
| Halitta | Shingilam |
|---|
| VulDB gite | 304671 [Demtec Graphytics 5.0.7 HTTP GET Parameter /visualization Cross Site Scripting] |
|---|
| Nganji | 20 |
|---|