[CVE-2022–32060]Snipe-IT Version v6.0.2 — File Upload Cross-Site Scripting

.

Vulnerability Explanation:

Attack Vectors:

Payload Attack:

https://github.com/bypazs/GrimTheRipper

Proof of Concept:

First, we login to the target application with admin privileges.

Then we click at the gear icon in the upper right corner.

We select “Branding” menu.

At Favicon, click “Select File”.

Browse the file where we prepared the payload XSS.

Then click “Save”.

We found a success message.

We select “Branding” menu again.

Then right click and select “Open Image in New Tab”.

We found the XSS!

Discoverer:

Grim The Ripper Team by SOSECURE Thailand

Disclosure Timeline:

  • 2022–05–27: Vulnerability discovered.
  • 2022–05–27: Vulnerability reported to the MITRE corporation.
  • 2022–05–27: Public disclosure of the vulnerability.
  • 2022–07–08: CVE has been reserved.

Reference:

  1. https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34963
  2. https://snipeitapp.com
  3. https://github.com/snipe/snipe-it/releases/tag/v6.0.2

--

--

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
GrimTheRipper

You get the best out of others when you give the best of yourself