[CVE-2022–32060]Snipe-IT Version v6.0.2 — File Upload Cross-Site Scripting

GrimTheRipper
2 min readMay 27, 2022

.

Vulnerability Explanation:

An arbitrary file upload vulnerability in the Update Branding Settings component of Snipe-IT v6.0.2 allows attackers to execute arbitrary code via a crafted file.

Attack Vectors:

We found a vulnerability file upload, when we upload malicious file at Update Branding Settings page.

Payload Attack:

https://github.com/bypazs/GrimTheRipper

Proof of Concept:

First, we login to the target application with admin privileges.

Then we click at the gear icon in the upper right corner.

We select “Branding” menu.

At Favicon, click “Select File”.

Browse the file where we prepared the payload XSS.

Then click “Save”.

We found a success message.

We select “Branding” menu again.

Then right click and select “Open Image in New Tab”.

We found the XSS!

Discoverer:

Grim The Ripper Team by SOSECURE Thailand

Disclosure Timeline:

  • 2022–05–27: Vulnerability discovered.
  • 2022–05–27: Vulnerability reported to the MITRE corporation.
  • 2022–05–27: Public disclosure of the vulnerability.
  • 2022–07–08: CVE has been reserved.

Reference:

  1. https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34963
  2. https://snipeitapp.com
  3. https://github.com/snipe/snipe-it/releases/tag/v6.0.2

--

--

GrimTheRipper

You get the best out of others when you give the best of yourself