Headline
FusionInvoice 2023-1.0 Cross Site Scripting
FusionInvoice version 2023-1.0 suffers from a persistent cross site scripting vulnerability.
# Exploit Title: FusionInvoice 2023-1.0 - Stored XSS (Cross-Site Scripting)# Date: 2023-05-24# Exploit Author: Andrea Intilangelo# Vendor Homepage: https://www.squarepiginteractive.com# Software Link: https://www.fusioninvoice.com/store# Version: 2023-1.0# Tested on: Latest Version of Desktop Web Browsers (ATTOW: Firefox 113.0.1, Microsoft Edge 113.0.1774.50)# CVE: CVE-2023-25439Description:A stored cross-site scripting (XSS) vulnerability in FusionInvoice 2023-1.0 (from Sqware Pig, LLC) allows attacker toexecute arbitrary web scripts or HTML.Injecting persistent javascript code inside the title and/or description while creating a task/expense/project (andpossibly others) it will be triggered once page gets loaded.Steps to reproduce:- Click on "Expenses", or "Tasks" and add (or edit an existing) one,- Insert a payload PoC inside a field, in example in the "Phone number" (or "Description"),- Click on 'Save'.Visiting the website dashboard, as well as the customer or project summary page, the javascript code will be executed.Timeline:2023-01-29: Vulnerability discovered2023-01-29: Vendor contacted2023-02-01: No reply, vendor contacted for 2nd time2023-02-02: Request for CVE reservation2023-04-25: Assigned CVE number CVE-2023-254392023-04-27: No reply, vendor contacted for 3rd time2023-05-15: No reply, vendor contacted for last time2023-05-24: Public disclosurePoC Screenshots:https://imagebin.ca/v/7FOZfztkDs3I
Related news
CVE-2023-25439: FusionInvoice 2023-1.0 Cross Site Scripting ≈ Packet Storm
Stored Cross Site Scripting (XSS) vulnerability in Square Pig FusionInvoice 2023-1.0, allows attackers to execute arbitrary code via the description or content fields to the expenses, tasks, and customer details.