Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

AcuToWeb server/10.5.0.7577c8b has a reflective XSS vulnerability #64

Open
Hebing123 opened this issue Jul 27, 2024 · 1 comment
Open

Comments

@Hebing123
Copy link
Owner

Hebing123 commented Jul 27, 2024

Summary

A reflected cross-site scripting (XSS) vulnerability was found in AcuToWeb server/10.5.0.7577c8b. An attacker can exploit this vulnerability to inject malicious JS code into an HTML page, which is then executed by a webmaster or administrator whenaccessing a URL with a payload.

Details

The parameters are reflected in the script tag of the page, which we can pass; String to end the previous statement and insert malicious js code.

The vulnerability occurs because the portgw parameter is only escaped with double quotes and Angle brackets.

POC

http://ip:port/?portgw=80089948;%20alert(1)
image

Note

I contacted OpenText about this vulnerability back in January 2024, but they have not responded at all.

@Hebing123
Copy link
Owner Author

CVE-2024-42852

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant