Snapforce CRM 8.3.0 Cross Site Scripting

Snapforce CRM version 8.3.0 suffers from multiple cross site scripting vulnerabilities.

MD5 | 7cba26c3ea2972fcf97c2e39c9893c15

Hello Team,

Greetings. there is list of xss vulnerabilities and Concurrent login
vulnerabilities are in snapforce
<> (version 8.3.0)

*Vulnerability List: *

1. Stored Cross Site Scripting

2. Stored Cross Site Scripting thorough UI Redirection.

3 Concurrent Login are Allowed

*Effected URL: *

*Steps to reproduce:*

1.Login to application using

2. Goto the Accounts creation location and create new Account.

3. Fill all required parameters and insert XSS payload in description
location and save it.

4. once you saved the xss payload in description location cross site
scripting payload can execute.

5. application can redirect to attacker application my case i have
redirected to page

6. for more information please see attached file




• Output encoding: It is recommended to implement ‘output encoding’ to
convert untrusted input into a safe form where the input is displayed as
data to the user without executing as code in the browser.

Java HTML encoding Function

public static String HTMLEncode(String aTagFragment){

final StringBuffer result = new StringBuffer();

final StringCharacterIterator iterator = new


char character = iterator.current();

while (character != StringCharacterIterator.DONE )


if (character == '<') result.append("<");

else if (character == '>') result.append(">");

else if (character == '\"') result.append(""");

else if (character == '\'') result.append("'");

else if (character == '\\') result.append("\");

else if (character == '&') result.append("&");

else {

//the char is not a special one

//add it to the result as is



character =;


return result.toString();


• Escaping: Escape all untrusted data based on the HTML context (body,
attribute, JavaScript, CSS, or URL) that the data will be placed into.


String safe = ESAPI.encoder().encodeForHTML( request.getParameter( "input"
) );

• Filtering input parameter: Positive or "whitelist" input validation with
appropriate canonicalization is the recommended filtering technique.
Alternatively, black-list filtering input works by removing some or all
special characters from your input. Special characters are characters that
enable script to be generated within an HTML stream. Special characters
include the following:

<> " ' % ; ) ( & + -

JavaScript Codefunction RemoveBad(strTemp) {

strTemp = strTemp.replace(/\<|\>|\"|\'|\%|\;|\(|\)|\&|\+|\-/g,"");

return strTemp;


Related Posts