header-logo
Suggest Exploit
vendor:
YetiForce CRM
by:
David Silveiro
7,5
CVSS
HIGH
Persistant XSS
79
CWE
Product Name: YetiForce CRM
Affected Version From: 3.1
Affected Version To: 3.1
Patch Exists: YES
Related CWE: N/A
CPE: yetiforce
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2016

YetiForce CRM < 3.1 - Persistant XSS Vulnerability

YetiForce CRM was built on a rock-solid Vtiger foundation, but has hundreds of changes that help to accomplish even the most challenging tasks in the simplest way. YetiForce is vulnerable to a stored XSS vulnerability present within a users comment section. Within 'Companies & Accounts > Accounts' select your prefered user, and then in the 'Comments' section input; <img src=x onerror=alert('XSS');> Either refresh the current page, or navigate back to 'Accounts' and the XSS payload will be triggered.

Mitigation:

Ensure that user input is properly sanitized and validated before being stored and displayed.
Source

Exploit-DB raw data:

# Exploit Title: YetiForce CRM < 3.1  - Persistant XSS Vulnerability
# Exploit Author: David Silveiro 
# Exploit Author Github: github.com/davidsilveiro
# Exploit Author Twitter: twitter.com/david_silveiro 
# Vendor Homepage: https://yetiforce.com/
# Software Link: http://sourceforge.net/projects/yetiforce/
# Date: Fixed on 20th June 2016

YetiForce CRM was built on a rock-solid Vtiger foundation, but has hundreds of changes that help to accomplish even the most challenging tasks in the simplest way

YetiForce is vulnerable to a stored XSS vulnerability present within a users comment section.

POC:

Within 'Companies & Accounts > Accounts' select your prefered user, and then in the 'Comments' section input;

<img src=x onerror=alert('XSS');>

Either refresh the current page, or navigate back to 'Accounts'