[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

InvoicePlane 1.4.10 File Upload / Cross Site Scripting Vulnerabilities

Author
Jasveer Singh
Risk
[
Security Risk High
]
0day-ID
0day-ID-27833
Category
web applications
Date add
24-05-2017
Platform
php
title: Arbitrary File Upload & Stored XSS
            product: InvoicePlane
 vulnerable version: 1.4.10
      fixed version: 1.5.2
         CVE number: -
             impact: High
           homepage: https://invoiceplane.com/
              found: 2017-04-10
                 by: Jasveer Singh (Office Kuala Lumpur)
                     SEC Consult Vulnerability Lab

                     An integrated part of SEC Consult
                     Bangkok - Berlin - Linz - Luxembourg - Montreal - Moscow
                     Kuala Lumpur - Singapore - Vienna (HQ) - Vilnius - Zurich

                     https://www.sec-consult.com

=======================================================================

Vendor description:
-------------------
"InvoicePlane is a self-hosted open source application for managing your
quotes, invoices, clients and payments."

Source: https://invoiceplane.com/


Business recommendation:
------------------------
By exploiting the vulnerabilities documented in this advisory, an attacker can
fully compromise the web server which has InvoicePlane installed. Potentially
sensitive invoice data might get exposed through this attack.

SEC Consult recommends not to attach InvoicePlane to the network until a
thorough security review has been performed by security professionals and all
identified issues have been resolved.


Vulnerability overview/description:
-----------------------------------
1. Arbitrary File Upload
An authenticated user can upload a malicious file to the webserver. It is
possible for an attacker to upload a script which is able to compromise the
webserver.

2. Stored Cross Site Scripting
This vulnerability allows an authenticated user to inject malicious client
side script which will be executed in the browser of users if they visit
the manipulated site.


Proof of concept:
-----------------
1. Arbitrary File Upload
Below URL is used to upload the malicious file through the attachment
segment.

URL     : http://$DOMAIN/index.php/invoices/view/$INVOICE-ID


2. Stored Cross Site Scripting
The following parameters have been found to be vulnerable against
stored cross site scripting. Furthermore, there exist many more
vulnerable parameters.

The following payload shows a simple alert message box:
URL     : http://$DOMAIN/index.php/clients/view/$Client-ID
METHOD  : POST
PAYLOAD : client_name="onmouseover=prompt("XSS")>

URL     : http://$DOMAIN/index.php/index.php/users/form/$User-ID
METHOD  : POST
PAYLOAD : user_name="onmouseover=prompt("XSS1")>


Vulnerable / tested versions:
-----------------------------
InvoicePlane version 1.4.10 has been tested. This version was the latest
at the time the security vulnerabilities were discovered.


Vendor contact timeline:
------------------------
2017-04-11: Contacting vendor through mail@invoiceplane.com
2017-04-11: Vendor requests security advisory to be shared over unencrypted
            channel.
2017-04-23: Vendor released patch version 1.5.0 however not all
            vulnerabilities were fixed properly.
2017-05-07: Patch (1.5.2) released by the vendor which fixes all issues
2017-05-23: Public release of security advisory.


Solution:
---------
Upgrade to InvoicePlane 1.5.2 as version 1.5.0 doesn't fix all the
identified vulnerabilities:

https://community.invoiceplane.com/t/topic/4258

#  0day.today [2024-11-15]  #