Loadbalancer.org Enterprise VA MAX 8.3.2 – Remote Code Execution
Loadbalancer.org Enterprise VA MAX - Remote Code Execution via Unauthenticated Stored XSS. Two instances of Stored XSS were found - exploit uses both. It is possible to inject custom JavaScript code during authentication to /lbadmin/. Application takes input from Basic Auth (username) and stores it without encoding/sanitization/filtering in Apache Error Log. This instance only forks for HTTPS. It is also possible to inject custom JavaScript code by accessing URL like /?<XSS>. Such JavaScript is stored in Apache User Log. This way attacker can store JavaScript code that can for example execute system command as root. This is actually what this exploit does - spawns reverse shell. When application user browses Apache Error Log or Apache User Log custom JavaScript code gets automatically executed.