BigProf Online Invoicing System before 3.1 fails to correctly sanitize an XSS payload when a user registers using the self-registration functionality. As such, an attacker can input a crafted payload that will execute upon the application's administrator browsing the registered users' list. Once the arbitrary Javascript is executed in the context of the admin, this will cause the attacker to gain administrative privileges, effectively leading into an application takeover. This affects app/membership_signup.php and app/admin/pageViewMembers.php.
References
Link | Resource |
---|---|
https://labs.ingredous.com/2020/07/13/ois-membershipsignup-xss/ | Exploit Third Party Advisory |
https://github.com/bigprof-software/online-invoicing-system/releases/tag/3.1 | Third Party Advisory |
Configurations
Information
Published : 2020-12-23 20:15
Updated : 2020-12-28 09:42
NVD link : CVE-2020-35676
Mitre link : CVE-2020-35676
JSON object : View
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Products Affected
bigprof
- online_invoicing_system