0day.today - Biggest Exploit Database in the World.
Things you should know about 0day.today:
Administration of this site uses the official contacts. Beware of impostors!
- We use one main domain: http://0day.today
- Most of the materials is completely FREE
- If you want to purchase the exploit / get V.I.P. access or pay for any other service,
you need to buy or earn GOLD
Administration of this site uses the official contacts. Beware of impostors!
We DO NOT use Telegram or any messengers / social networks!
Please, beware of scammers!
Please, beware of scammers!
- Read the [ agreement ]
- Read the [ Submit ] rules
- Visit the [ faq ] page
- [ Register ] profile
- Get [ GOLD ]
- If you want to [ sell ]
- If you want to [ buy ]
- If you lost [ Account ]
- Any questions [ admin@0day.today ]
- Authorisation page
- Registration page
- Restore account page
- FAQ page
- Contacts page
- Publishing rules
- Agreement page
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
You can contact us by:
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
Open-AudIT Professional - 2.1.1 - Cross-Site Scripting Vulnerability
Author
Risk
[
Security Risk Medium
]0day-ID
Category
Date add
CVE
Platform
# Exploit Title: Open-AudIT Professional 2.1.1 – Multiple Cross-Site Scripting # Exploit Author: Tejesh Kolisetty # Vendor Homepage: https://opmantek.com/ # Software Link: https://opmantek.com/network-tools-download/ # Affected Version: 2.1.1 # Category: WebApps # Tested on: Win7 Professional # CVE : CVE-2018-9155 # 1. Vendor Description: # Network Discovery and Inventory Software | Open-AudIT | Opmantek # Discover what's on your network. Open-AudIT is the world's leading network discovery, inventory and audit program. Used by over 10,000 customers. # 2. Technical Description: # Cross-site scripting (XSS) vulnerability found in Multiple instances of Open-AudIT Professional - 2.1.1 that allows remote attackers to inject arbitrary web script or HTML, as demonstrated in below POC. # 3. Proof of Concept: # a) Login as user who is having Attributes Creation role # b) Navigate to Manage -> Attributes -> Create Attributes # c) Now fill the form with XSS payload in ‘Name’ field and submit payload: <script>alert('XSS')</script> # d) Once the data is saved, the script get executed. # Multiple Instances: Admin -> Logs -> View System Logs Manage -> Attributes -> Create Attributes Manage -> Users -> Create Users # 4. Solution: # Clone with below Gits: # https://github.com/Opmantek/open-audit/commit/aab685484446126a58a49b994ba5dfae6e92f4db#diff-e6d7b17fe09e809cb98cdf38b7f12638 # https://github.com/Opmantek/open-audit/commit/755a9af8895a9e28fac82d8add7012f77bb9a8d2 # Or Upgrade to latest release Open-AudIT Professional # https://opmantek.com/network-tools-download/ # 0day.today [2024-11-15] #