OpenDocMan 1.2.6.5 Stored/Reflective XSS
OpenDocMan is vulnerable to stored XSS, allowing any user the ability to upload malicious scripts. When adding a new file, a user can enter a malicious Description or Comment field input. Insufficient sanitization allows the following XSS to slip by: <sc<script>ript>alert(document.cookie)</sc<script>ript>. This value is then stored, and any user viewing it is affected. Admin's who are required to approve documents, or view them, are also affected. Stored XSS also exists when generating new Departments; by inserting a malicious Department name like above, arbitrary code can be remotely executed to visitors. Reflective XSS exists in the error.php page. By submitting the following request, an alert is generated: http://localhost/opendocman/error.php?ec=13&last_message=%3Csc%3Cscript%3Eript%3Ealert%281%29%3C/sc%3Cscript%3Eript%3E