Lucene search

K
huntrThanhlocstudent461E5F8F-17CF-4BE4-9149-111D0BD92D14
HistoryAug 19, 2022 - 5:45 p.m.

Persistent Cross Site Scripting - Workflow Module - Settings

2022-08-1917:45:24
thanhlocstudent
www.huntr.dev
14
cross site scripting
workflow module
settings
purifier
validation
stored xss
injection
vulnerability

EPSS

0.001

Percentile

21.4%

Description

The application uses Purifier to avoid the Cross Site Scripting attack. However, On Workflow module from Settings, the type of workflowModel->summary parameter is not defined and validated, it’s used directly without any encoding or validation on Workflows/Step1.tpl and Workflows/Step2.tpl. It allows attacker to inject arbitrary Javascript code to perform an Stored XSS attack.

Proof of Concept

  1. 1- Login to the application
  2. 2- Access the WidgetsManagement Module via the following URL:
  3. https://gitstable.yetiforce.com/index.php?module=Workflows&parent=Settings&view=Edit&record={id}
  4. 3-Change the {id} of the previous URL with the valid recordID.
    Change the value of “summary” parameter with the following payload:
Workflow" onfocus="alert(document.domain)" autofocus ""="

**Inject the payload
Payload

PoC

PoC Video

https://drive.google.com/file/d/1Ri-tO_QjVcugTkroVDi8KxUfkoTJIb6n/view?usp=sharing

EPSS

0.001

Percentile

21.4%

Related for 461E5F8F-17CF-4BE4-9149-111D0BD92D14