Overview
The RosarioSIS 6.7.2 vulnerability, identified as CVE-2020-15716, is a critical Cross-Site Scripting (XSS) flaw that allows attackers to inject malicious scripts into trusted web applications. This vulnerability arises from improper input validation, enabling unauthorized users to execute arbitrary JavaScript code in the context of a user’s session.
Technical Details
CVE-2020-15716 specifically exploits the lack of sanitization in user input fields within RosarioSIS, a popular open-source student information system. Attackers can craft a malicious payload and embed it in a URL or a form submission. When a user interacts with the compromised element, the embedded script executes in their browser, potentially leading to session hijacking, data theft, or further exploitation of the web application.
For instance, a malicious user could send a link containing the XSS payload to an unsuspecting user. When the victim clicks on the link, the script runs, allowing the attacker to capture sensitive information such as cookies, session tokens, or even perform actions on behalf of the user without their consent.
Impact
The consequences of this vulnerability can be severe. Successful exploitation can lead to unauthorized access to user accounts, data breaches, and loss of user trust. Organizations utilizing RosarioSIS may face compliance issues, reputational damage, and financial repercussions resulting from data loss or exposure.
Mitigation
To protect against CVE-2020-15716, it is crucial for organizations to implement robust input validation and output encoding practices. All user-generated content should be sanitized to prevent the execution of malicious scripts. Additionally, employing Content Security Policy (CSP) headers can mitigate the impact of XSS attacks by restricting the sources from which scripts can be loaded.
Security professionals should regularly update their systems to the latest version of RosarioSIS, where this vulnerability has been addressed. Conducting regular security assessments and penetration testing can also help identify and remediate potential vulnerabilities before they can be exploited.
Proof of Concept (PoC)
# Exploit Title: RosarioSIS 6.7.2 - Cross Site Scripting (XSS)
# Date: 2025-11-25
# Exploit Author: CodeSecLab
# Vendor Homepage: https://gitlab.com/francoisjacquet/rosariosis
# Software Link: https://gitlab.com/francoisjacquet/rosariosis
# Version: 6.7.2
# Tested on: Windows
# CVE : CVE-2020-15716
Proof Of Concept
http://rosariosis/Modules.php?modname=Users/Preferences.php&tab=%22%20onmouseover%3Dalert%281%29%20x%3D%22
**Conditions**:
1. User must be authenticated (as shown by the session checks in `Warehous.php`)
2. `modfunc` parameter must **not** be present in the request
Steps to Reproduce:
1. Log in as an admin user.
2. Send the request.
3. Observe the result