[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

Companymaps 8.0 Cross Site Scripting Vulnerability

Author
Lucas Noki
Risk
[
Security Risk Medium
]
0day-ID
0day-ID-38653
Category
web applications
Date add
04-05-2023
CVE
CVE-2023-29808
Platform
php
# Exploit Title: Reflected Cross Site Scripting

- Exploit Author: Lucas Noki (0xPrototype)
- Vendor Homepage: https://github.com/vogtmh
- Software Link: https://github.com/vogtmh/cmaps
- Version: 8.0
- Tested on: Mac, Windows, Linux
- CVE : CVE-2023-29808

*Description:*

The vulnerability found is Reflected Cross Site Scripting. When the `/index.php?map=overview&findme=` endpoint is hit with a request where the "findme" parameter contains a malicious payload we have the possibility to perform an XSS attack. This happens because the input isn't sanitized.

*Steps to reproduce:*

1. Clone the repository and install the application
2. Send a maliciously crafted payload via the "findme" parameter to the following endpoint: /index.php?map=overview&findme=
3. The payload used is: ";alert(document.cookie)//
4. Simply visiting the complete URL: http://IP/index.php?map=overview&findme=";alert(document.cookie)// is enough. Now an alertbox should pop up with your current cookie value. <img src="Screenshot 2023-05-03 at 17.56.59.png" alt="Screenshot 2023-05-03 at 17.56.59" style="zoom:50%;" />

Special thanks goes out to iCaotix who greatly helped me in getting the environment setup as well as debugging my payload.

#  0day.today [2024-07-05]  #