0day.today - Biggest Exploit Database in the World.
Things you should know about 0day.today:
Administration of this site uses the official contacts. Beware of impostors!
- We use one main domain: http://0day.today
- Most of the materials is completely FREE
- If you want to purchase the exploit / get V.I.P. access or pay for any other service,
you need to buy or earn GOLD
Administration of this site uses the official contacts. Beware of impostors!
We DO NOT use Telegram or any messengers / social networks!
Please, beware of scammers!
Please, beware of scammers!
- Read the [ agreement ]
- Read the [ Submit ] rules
- Visit the [ faq ] page
- [ Register ] profile
- Get [ GOLD ]
- If you want to [ sell ]
- If you want to [ buy ]
- If you lost [ Account ]
- Any questions [ admin@0day.today ]
- Authorisation page
- Registration page
- Restore account page
- FAQ page
- Contacts page
- Publishing rules
- Agreement page
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
You can contact us by:
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
Open-AudIT Community - 2.2.0 – Cross-Site Scripting Vulnerability
Author
Risk
[
Security Risk Medium
]0day-ID
Category
Date add
CVE
Platform
# Exploit Title: Open-AudIT Community - 2.2.0 – Cross-Site Scripting # Exploit Author: Tejesh Kolisetty # # Vendor Homepage: https://opmantek.com/ # Software Link: https://opmantek.com/network-tools-download/ # Affected Version: 2.2.0 # Category: WebApps # Tested on: Win7 Professional # CVE : CVE-2018-10314 # 1. Vendor Description: # Network Discovery and Inventory Software | Open-AudIT | Opmantek # Discover what's on your network. Open-AudIT is the world's leading network discovery, inventory and audit program. Used by over 10,000 customers. # 2. Technical Description: # Cross-site scripting (XSS) vulnerability found in Multiple instances of Open-AudIT Community - 2.2.0 that allows remote attackers to inject arbitrary web script or HTML, as demonstrated in below POC. # 3. Proof of Concept: # a) Login as user who is having access to download scripts # b) Navigate to Discover -> Audit Scripts -> List Scripts -> Download # c) Now click Download any script # d) Now capture the request using the Burp suit tool and append below payload to ‘action’ variable payload: =download"><script>alert(‘XSS’)</script> # e) Then the script is executed on the browser and shows the popup. # Multiple Instances: Discover -> Audit Scripts -> List Scripts -> Download Admin -> Logs -> View System Logs Admin -> Logs -> View Access Logs etc.,. # 4. Solution: # Upgrade to latest release Open-AudIT 2.2.1 # http://dl-openaudit.opmantek.com/OAE-Win-x86_64-release_2.2.1.exe # 0day.today [2024-12-24] #