HTML-injection-search

CVE-2023-40809-HTML injection-search


Vendor of the product(s) –

    • Product Name – OpenCRX
    • Version – exact ver of the product which is vulnerable – 5.2.0
    • Affected component(s) – Search Criteria-Activity Number
    • Attack vector(s) – Web Application
    • Suggested description of the vulnerability for use in the CVE- HTML injection on the Search Criteria-Activity Number
    • Discoverer(s)/Credits – your name -Nandini Sharma
    • Step by Step POC written in sequential order – prepare a word file for all this.

Step-2 Now, create new Search Criteria-Activity Number in the Saved Search Activity as shown below: –

Step-3 Now, Insert Html payload in the Name, Description and Activity Number field as shown below: –

Paylaod – <font color=”blue”>Esecforte</font>

Step-4 Now, click on the save button to save this activity. It has been observed by the auditor that HTML payload executed.

[Discoverer]                                                                                                      

Nandini Sharma from eSec Forte Technologies Pvt. Ltd