0day.today - Biggest Exploit Database in the World.
Things you should know about 0day.today:
Administration of this site uses the official contacts. Beware of impostors!
- We use one main domain: http://0day.today
- Most of the materials is completely FREE
- If you want to purchase the exploit / get V.I.P. access or pay for any other service,
you need to buy or earn GOLD
Administration of this site uses the official contacts. Beware of impostors!
We DO NOT use Telegram or any messengers / social networks!
Please, beware of scammers!
Please, beware of scammers!
- Read the [ agreement ]
- Read the [ Submit ] rules
- Visit the [ faq ] page
- [ Register ] profile
- Get [ GOLD ]
- If you want to [ sell ]
- If you want to [ buy ]
- If you lost [ Account ]
- Any questions [ admin@0day.today ]
- Authorisation page
- Registration page
- Restore account page
- FAQ page
- Contacts page
- Publishing rules
- Agreement page
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
You can contact us by:
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
InvoicePlane 1.4.10 File Upload / Cross Site Scripting Vulnerabilities
title: Arbitrary File Upload & Stored XSS product: InvoicePlane vulnerable version: 1.4.10 fixed version: 1.5.2 CVE number: - impact: High homepage: https://invoiceplane.com/ found: 2017-04-10 by: Jasveer Singh (Office Kuala Lumpur) SEC Consult Vulnerability Lab An integrated part of SEC Consult Bangkok - Berlin - Linz - Luxembourg - Montreal - Moscow Kuala Lumpur - Singapore - Vienna (HQ) - Vilnius - Zurich https://www.sec-consult.com ======================================================================= Vendor description: ------------------- "InvoicePlane is a self-hosted open source application for managing your quotes, invoices, clients and payments." Source: https://invoiceplane.com/ Business recommendation: ------------------------ By exploiting the vulnerabilities documented in this advisory, an attacker can fully compromise the web server which has InvoicePlane installed. Potentially sensitive invoice data might get exposed through this attack. SEC Consult recommends not to attach InvoicePlane to the network until a thorough security review has been performed by security professionals and all identified issues have been resolved. Vulnerability overview/description: ----------------------------------- 1. Arbitrary File Upload An authenticated user can upload a malicious file to the webserver. It is possible for an attacker to upload a script which is able to compromise the webserver. 2. Stored Cross Site Scripting This vulnerability allows an authenticated user to inject malicious client side script which will be executed in the browser of users if they visit the manipulated site. Proof of concept: ----------------- 1. Arbitrary File Upload Below URL is used to upload the malicious file through the attachment segment. URL : http://$DOMAIN/index.php/invoices/view/$INVOICE-ID 2. Stored Cross Site Scripting The following parameters have been found to be vulnerable against stored cross site scripting. Furthermore, there exist many more vulnerable parameters. The following payload shows a simple alert message box: URL : http://$DOMAIN/index.php/clients/view/$Client-ID METHOD : POST PAYLOAD : client_name="onmouseover=prompt("XSS")> URL : http://$DOMAIN/index.php/index.php/users/form/$User-ID METHOD : POST PAYLOAD : user_name="onmouseover=prompt("XSS1")> Vulnerable / tested versions: ----------------------------- InvoicePlane version 1.4.10 has been tested. This version was the latest at the time the security vulnerabilities were discovered. Vendor contact timeline: ------------------------ 2017-04-11: Contacting vendor through mail@invoiceplane.com 2017-04-11: Vendor requests security advisory to be shared over unencrypted channel. 2017-04-23: Vendor released patch version 1.5.0 however not all vulnerabilities were fixed properly. 2017-05-07: Patch (1.5.2) released by the vendor which fixes all issues 2017-05-23: Public release of security advisory. Solution: --------- Upgrade to InvoicePlane 1.5.2 as version 1.5.0 doesn't fix all the identified vulnerabilities: https://community.invoiceplane.com/t/topic/4258 # 0day.today [2024-11-15] #