Twenty Year Anniversary

Microsoft Dynamic CRM 2016 Cross Site Scripting

Microsoft Dynamic CRM 2016 Cross Site Scripting
Posted Jun 30, 2017
Authored by Gregory Draperi

Microsoft Dynamic CRM 2016 versions SP1 and below suffer from a cross site scripting vulnerability.

tags | exploit, xss
MD5 | 6edb82874ea081b8edfc3b1e81d10c4d

Microsoft Dynamic CRM 2016 Cross Site Scripting

Change Mirror Download
Product: MS Dynamic CRM 2016
Vendor: Microsoft

Vulnerability type: Cross Site Scripting
Vulnerable version: MS Dynamic CRM 2016 SP1 and previous
Vulnerable component: SyncFilterPage.aspx
Report confidence: Confirmed
Solution status: Not fixed by Vendor, will not patch the vuln.
Fixed versions: -
Researcher credits: Gregory DRAPERI
Vendor notification: 2017-05-30
Solution date:
Public disclosure: 2016-07-01
Reference: https://remoteawesomethoughts.blogspot.com/2017/06/cross-site-scripting-vulnerability-in.html
CVE reference:
CVSSv3: 5.4 <https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N>

Vulnerability Details:
MS Dynamic CRM 2016 is CRM tool. So like all others Customer
Relationship Management (CRM) applications are here to manage
company's interaction with current and potential customers.There is a
specific web-page accessible to define filters. This webpage is
accessible without authentication so it is easy to check its
existence. The vulnerability in located in the webpage
"SyncFilterPage.aspx" that will interpret arbitrary JavaScript in case
this link is submitted.

The vulnerability might also be present on Microsoft Dynamic CRM in
the cloud. It has not been possible to gather an account to verify. If
someone can try or share with me an instance URL I would be more than
happy.

Risk:
The malicious script can access any cookies without a HTTPOnly flag or
other sensitive information retained by the browser and used with that
site. These scripts can even rewrite the content of the HTML page to
perform phishing attemps or perform actions on the behalf of the
logged user.

PoC:
http://X.X.X.X/_controls/EditFilterControl/SyncFilterPage.aspx?requiredFields=toto%22;}alert(document.cookie);function%20test(){var%20a=%22test

Timelines
I tried to reach out Microsoft several times but after their first
response seeming to say it was not a real vulnerability, I have not
received any responses.
a"30/05/2017: First email to secure@microsoft.com to disclose the vulnerability
30/05/2107: Answer from Microsoft asking for more details and pointing
to a link defining what Microsoft thinks is a vulnerability
(https://technet.microsoft.com/library/cc751383.aspx)
31/05/2017: Second email explaining why it is a vulnerability and
giving more details
02/06/2017: Third attempt to check if they need more details
06/06/2017: Fourth attempt to check if they need more details
16/06/2017: Fifth attempt to check if they need more details and
letting them know that it will be published in case they think it
won't be fixed
28/06/2017: Last attempt to check if they need more details and
letting them know that it will be published

Best,

Gregory

--
GrA(c)gory Draperi

Comments

RSS Feed Subscribe to this comment feed

No comments yet, be the first!

Login or Register to post a comment

File Archive:

September 2018

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    1 Files
  • 2
    Sep 2nd
    3 Files
  • 3
    Sep 3rd
    15 Files
  • 4
    Sep 4th
    15 Files
  • 5
    Sep 5th
    18 Files
  • 6
    Sep 6th
    18 Files
  • 7
    Sep 7th
    15 Files
  • 8
    Sep 8th
    2 Files
  • 9
    Sep 9th
    2 Files
  • 10
    Sep 10th
    16 Files
  • 11
    Sep 11th
    17 Files
  • 12
    Sep 12th
    15 Files
  • 13
    Sep 13th
    29 Files
  • 14
    Sep 14th
    21 Files
  • 15
    Sep 15th
    3 Files
  • 16
    Sep 16th
    1 Files
  • 17
    Sep 17th
    15 Files
  • 18
    Sep 18th
    16 Files
  • 19
    Sep 19th
    29 Files
  • 20
    Sep 20th
    18 Files
  • 21
    Sep 21st
    5 Files
  • 22
    Sep 22nd
    2 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2018 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close