Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-54795 PoC — Engineering SpagoBI 跨站脚本漏洞

Source
Associated Vulnerability
Title:Engineering SpagoBI 跨站脚本漏洞 (CVE-2024-54795)
Description:Engineering SpagoBI是意大利Engineering公司的一款开源的基于J2EE框架的商业智能套件。该套件主要用于管理BI对象,如报表、记分卡以及数据挖掘模型等,并可通过BI管理器控制、校验、验证与分发这些BI对象。 Engineering SpagoBI 3.5.1及之前版本存在安全漏洞,该漏洞源于在工作表设计器功能的create/edit表单中包含多个存储型跨站脚本漏洞。
Description
SpagoBI multiple stored xss
Readme
# CVE-2024-54795

**Severity :** **Medium** (**5.4**)

**CVSS score :** `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N` 

## Summary :
Engineering Ingegneria Informatica **SpagoBI** version **3.5.1** is affected by multiple **stored XSS** inside of the worksheet designer page.

## Poc

### Steps to Reproduce :
1. While editing a document inserting custom text or while seving inserting filename and info insert the following payload:
  ```
    "><img src="#" onerror=alert(1)>
  ```
2. Visit the home/worksheet designer page and the pages of the file saved. The html will be reflected and the alert prompted.

## Affected Version Details :

- <= 3.5.1

## Impact :

If the attacker is logged into the app with sufficient permissions to access the worksheet designer page, can store a JS script that can steal user cookies, perform horizontal/vertical privilege escalation, or perform malicious actions such as downloading a malicious file.

## Mitigation :

-  Update to the latest version.
  
## References :
- 
File Snapshot

[4.0K] /data/pocs/391533b31df38d52396241f937d39ccfef963079 └── [1014] README.md 0 directories, 1 file
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.