Cross-site Scripting (XSS) - Stored in yetiforcecompany/yetiforcecrm

Valid

Reported on

Dec 13th 2021


Description

I found file upload XSS, Stored Cross-Site Scripting (XSS) vulnerability due to the lack of content validation and output encoding.

Proof of Concept

1. login and navigate to https://gitstable.yetiforce.com/index.php?module=Users&view=PreferenceEdit&record=5
2. Layout > photo > Add file.
3. Upload the XSS file upload payload.

File upload xss payload https://drive.google.com/file/d/1TrU3Fa8SlQEBModzvRcYD0MiV2pL9672/view?usp=sharing

XSS POC
https://drive.google.com/file/d/1jDh-n8vXRpMuSzXWvlRz_eqcWbMYqWnM/view?usp=sharing

Impact

Stored XSS generally occurs when user input is stored on the target server, such as in a database, in a message forum, visitor log, comment field, etc. And then a victim is able to retrieve the stored data from the web application without that data being made safe to render in the browser.

We are processing your report and will contact the yetiforcecompany/yetiforcecrm team within 24 hours. a year ago
Mariusz
a year ago

Maintainer


I am unable to induce vulnerability, please contact m.krzaczkowski@yetiforce.com

Raptor
a year ago

Researcher


Please download and upload this payload https://drive.google.com/file/d/1TrU3Fa8SlQEBModzvRcYD0MiV2pL9672/view?usp=sharing

Mariusz Krzaczkowski validated this vulnerability a year ago
Raptor has been awarded the disclosure bounty
The fix bounty is now up for grabs
Mariusz Krzaczkowski marked this as fixed in 6.4.0 with commit 9cdb01 a year ago
Mariusz Krzaczkowski has been awarded the fix bounty
This vulnerability will not receive a CVE
File.php#L139-L251 has been validated
Mariusz
a year ago

Maintainer


Bug fixed in 6.3.0_SecurityFix https://github.com/YetiForceCompany/UpdatePackages/tree/master/YetiForce%20CRM%206.x.x/6.3.0_SecurityFix/zip

to join this conversation