# Reflected XSS - Future Goals

## Reflected XSS (authenticated)  <a href="#finding1" id="finding1"></a>

Performance Pro v3.19.17 and earlier is affected by multiple Stored Cross-Site Scripting (XSS) vulnerabilities (Persistent/Type II) via POST requests to:

{% hint style="warning" %}
`/index.php?mode=mGoalSetup&job=edit&type_id=2&id=<goal_id>`
{% endhint %}

### Description

The application is vulnerable to multiple instances of stored (persistent) XSS in the Future Goals functionality. Malicious input provided by an authenticated user is stored server-side and later rendered into the DOM without proper encoding or sanitization. This allows execution of arbitrary JavaScript in the context of any user viewing the affected pages.

## **Affected Endpoints and Parameters:**

**Input (create/update goal):**\
Vulnerable fields:

* Goal Name
* Goal Notes (name field)
* Action Step Name
* Notes Name

**Reflected when viewing/printing goals:**\
`GET /viewgoals.php?printview=1&type=future`\
Vulnerable fields:

* Goal Name
* Goal Description
* Action Step Description

***

### Exploitation

* Inject malicious javascript into any of the following input fields for future goals.
  * Goal Name
  * Goal Description
  * Action Steps Name
  * Action Steps Description
  * Note Name
* **Send** the crafted URL to a victim via phishing, social engineering, or any other attack vector.
* When the victim navigates to the modified URL, the application reflects the malicious input directly into the browser without sufficient sanitization.
* **The victim’s browser renders the injected payload** in the error message, allowing arbitrary script execution within the victim's browser.

### Example 1: XSS in Updating/Creating Future Goals

* Any of the highlighted fields are vulnerable to XSS between the Update/Creation\
  ![](https://2946459361-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FGyD3p56S2Ma0Q756LEYJ%2Fuploads%2Fb6DS6g30Atp7iROWfaTU%2Fimage.png?alt=media\&token=2d8fd364-e260-4bee-9017-e6c875cc338b)\
  ![](https://2946459361-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FGyD3p56S2Ma0Q756LEYJ%2Fuploads%2F9OaSWN7bsDwRXkj4ePH0%2Fimage.png?alt=media\&token=093c7554-d64d-4009-bcd3-36f1d14b7d2c)\
  ![](https://2946459361-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FGyD3p56S2Ma0Q756LEYJ%2Fuploads%2FJEScbQofKpCgtSHci0i5%2Fimage.png?alt=media\&token=2260bedd-46d9-4086-b85d-c66730bde60d)
* Successful XSS exploitation\
  ![](https://2946459361-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FGyD3p56S2Ma0Q756LEYJ%2Fuploads%2Fim8t6dJsiiYfmZ2KEDrJ%2Fimage.png?alt=media\&token=b36271c3-008f-4328-bfdb-c797a46eda01)

## Example 2: XSS in View/Print of Future Goals

* Any of the highlighted fields are vulnerable to XSS in the View/Print URL\
  ![](https://2946459361-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FGyD3p56S2Ma0Q756LEYJ%2Fuploads%2FbnzcCzlecAZ1nC7DDJ7r%2Fimage.png?alt=media\&token=90d3ff9d-8681-4963-9f99-75c220688602)
* Successful XSS exploitation\
  ![](https://2946459361-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FGyD3p56S2Ma0Q756LEYJ%2Fuploads%2FtjB31qiuzw4wfzp3oeky%2Fimage.png?alt=media\&token=57c3c22e-0080-4c0b-a61e-735bcbdce281)<br>
