Security
Headlines
HeadlinesLatestCVEs

Headline

CVE-2022-30519: Disclosed/CVE-2022-30519 at main · earth2sky/Disclosed

XSS in signing form in Reprise Software RLM License Administration v14.2BL4 allows remote attacker to inject arbitrary code via password field.

CVE
#xss#vulnerability#web#windows#git#auth

# Exploit Title: Cross-Site Scripting (XSS)

# Detailed Description:

Cross-site scripting (also known as XSS) is a web security vulnerability that allows an attacker to compromise the interactions that users have with a vulnerable application. It allows an attacker to circumvent the same origin policy, which is designed to segregate different websites from each other. Cross-site scripting vulnerabilities normally allow an attacker to masquerade as a victim user, to carry out any actions that the user is able to perform, and to access any of the user’s data. If the victim user has privileged access within the application, then the attacker might be able to gain full control over all of the application’s functionality and data.

# Exploit Author: Mohammed A.Siledar

# Author Company : reprisesoftware

# Version: rlm.v14.2BL4

# Vendor home page : https://reprisesoftware.com

# Software Link: https://www.reprisesoftware.com/license_admin_kits/rlm.v14.2BL4-x64_w3.admin.exe

# Authentication Required: No

# CVE : CVE-2022-30519

# Tested on: Windows 10

Impact:

Impact:

The impact of cross-site scripting vulnerabilities can vary from one web application to another. It ranges from session hijacking to credential theft and other security vulnerabilities. By exploiting a cross-site scripting vulnerability, an attacker can impersonate a legitimate user and take over their account.

If the victim user has administrative privileges, it might lead to severe damage such as modifications in code or databases to further weaken the security of the web application, depending on the rights of the account and the web application.

Here are some of the most common impacts of cross-site scripting attacks:

1. Account Hijacking

2. Credential Theft

3. Data Leakage

# Poc code

http://localhost/goform/login_process?username=admin&password=admin%22%3E%3Cimg%20src=x%20onerror=confirm(123)%3E

Note: Vulnerability has been fixed by upgrading version of software.

CVE: Latest News

CVE-2023-50976: Transactions API Authorization by oleiman · Pull Request #14969 · redpanda-data/redpanda