Security
Headlines
HeadlinesLatestCVEs

Headline

CVE-2023-0325: Uvdesk 1.1.1 - Stored Cross-Site Scripting | Advisories | Fluid Attacks

Uvdesk version 1.1.1 allows an unauthenticated remote attacker to exploit a stored XSS in the application. This is possible because the application does not correctly validate the message sent by the clients in the ticket.

CVE
#xss#vulnerability#linux#git#java#auth

Summary

Name

Uvdesk 1.1.1 - Stored Cross-Site Scripting

Code name

Labrinth

Product

Uvdesk

Affected versions

Version 1.1.1

State

Public

Release date

2023-04-10

Vulnerability

Kind

Stored cross-site scripting (XSS)

Rule

010. Stored cross-site scripting (XSS)

Remote

Yes

CVSSv3 Vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N

CVSSv3 Base Score

7.1

Exploit available

Yes

CVE ID(s)

CVE-2023-0325

Description

Uvdesk version 1.1.1 allows an unauthenticated remote attacker to exploit a stored XSS in the application. This is possible because the application does not correctly validate the message sent by the clients in the ticket.

Vulnerability

This vulnerability occurs because the application does not correctly validate the message sent by the clients in the ticket.

Exploitation

We must send the payload xss through the ticket message. It is important to use a proxy here, because the payload will be encoded from javascript.

Our security policy

We have reserved the CVE-2023-0325 to refer to this issue from now on.

  • https://fluidattacks.com/advisories/policy/

System Information

  • Version: Uvdesk 1.1.1

  • Operating System: GNU/Linux

Mitigation

There is currently no patch available for this vulnerability.

Credits

The vulnerability was discovered by Carlos Bello from Fluid Attacks’ Offensive Team.

References

Vendor page https://github.com/uvdesk/community-skeleton

Timeline

2023-01-16

Vulnerability discovered.

2023-01-16

Vendor contacted.

2023-01-16

Vendor replied acknowledging the report.

2023-04-10

Public Disclosure.

CVE: Latest News

CVE-2023-50976: Transactions API Authorization by oleiman · Pull Request #14969 · redpanda-data/redpanda