Lucene search

K
huntrThanhlocstudentD213D7EA-FE92-40B2-A1F9-2BA32DEC50F5
HistoryAug 19, 2022 - 5:57 p.m.

Persistent Cross Site Scripting - BusinessHours Module - Settings

2022-08-1917:57:00
thanhlocstudent
www.huntr.dev
4

0.001 Low

EPSS

Percentile

21.6%

Description

The application uses Purifier to avoid the Cross Site Scripting attack. However, On BusinessHours module from Settings, the type of name parameter is “Text” but it is not validated and it’s used directly without any encoding or validation on EditViewBlocks.tpl. It allows attacker to inject arbitrary Javascript code to perform an Stored XSS attack.

Proof of Concept

  1. 1- Login to the application
  2. 2- Access the BusinessHours Module (Edit) via the following URL:
  3. https://gitstable.yetiforce.com/index.php?module=BusinessHours&parent=Settings&view=Edit&record={id}
  4. 3- Change the {id} of the previous URL with the valid recordID.
    Change the value of “name” parameter with the following payload:
BusinessHours" onfocus="alert(document.domain)" autofocus ""="

**Inject the payload
Payload
PoC

PoC Video

https://drive.google.com/file/d/1eOMZ1-ltqBA4OgJh1s14sRllXnqoU8XV/view?usp=sharing

0.001 Low

EPSS

Percentile

21.6%

Related for D213D7EA-FE92-40B2-A1F9-2BA32DEC50F5