header-logo
Suggest Exploit
vendor:
Password Manager for IIS
by:
VP4TR10T
6.1
CVSS
MEDIUM
Cross-Site Scripting (XSS)
79
CWE
Product Name: Password Manager for IIS
Affected Version From: 2
Affected Version To: 2
Patch Exists: NO
Related CWE: CVE-2022-36664
CPE: a:adiscon:password_manager_for_iis:2.0
Metasploit:
Other Scripts:
Platforms Tested: Windows
2022

Password Manager for IIS v2.0 – XSS

A Cross-Site Scripting (XSS) vulnerability exists in Password Manager for IIS v2.0 when changing user password. An attacker can send a malicious payload in the ReturnURL parameter of an HTTP POST request to PasswordManager.dll, which will be executed in the victim's browser. This can be used to steal the victim's cookies and hijack their session.

Mitigation:

Input validation should be used to prevent malicious payloads from being sent to the server. Additionally, the application should be configured to use a secure connection (HTTPS).
Source

Exploit-DB raw data:

# Exploit Title: Password Manager for IIS v2.0 - XSS
# Exploit Author: VP4TR10T
# Vendor Homepage: http://passwordmanager.adiscon.com/en/manual/
# Software Link: http://passwordmanager.adiscon.com/
<http://passwordmanager.adiscon.com/>
# Version: *Version 2.0
# Tested on: WINDOWS
# CVE : CVE-2022-36664


Affected URI (when changing user password):
POST /isapi/PasswordManager.dll HTTP/1.1

Affected Parameter in http
payload:*ReturnURL*=<script>alert(document.cookie)</script>

*Cordially,*