exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

openVIVA c2 20220101 Cross Site Scripting

openVIVA c2 20220101 Cross Site Scripting
Posted Oct 3, 2023
Authored by Daniel Hirschberger | Site sec-consult.com

openVIVA c2 suffers from a persistent cross site scripting vulnerability. Versions prior to 20220801 are affected.

tags | exploit, xss
advisories | CVE-2022-39172
SHA-256 | 1bb461472efdf8f6410f98641bda375496497eeeacb50a76a14f2e2f531514ed

openVIVA c2 20220101 Cross Site Scripting

Change Mirror Download
SEC Consult Vulnerability Lab Security Advisory < 20230925-0 >
=======================================================================
title: Stored Cross-Site Scripting
product: mb Support broker management solution openVIVA c2
vulnerable version: <20220801
fixed version: =>20220801
CVE number: CVE-2022-39172
impact: Medium
homepage: https://mbsupport.de
found: 2022-03-16
by: Daniel Hirschberger (Office Bochum)
SEC Consult Vulnerability Lab

An integrated part of SEC Consult, an Eviden business
Europe | Asia

https://www.sec-consult.com
=======================================================================

Vendor description:
-------------------
"Support small and medium-sized companies as well as large corporate customers
with just one software. Sales , inventory management , billing , e-mail and
much more - with openVIVA c2 you get everything in one application. Without
system disruption and in one database, you can do all the work of an insurance
broker with one piece of software.

Connect brokers, intermediaries, insurers and customers directly with our
self-service portals . Strengthen your customer relationships and work more
efficiently yourself.

mb Support offers portals for intermediaries as well as industrial and
commercial customers and tailor-made portal solutions for insurers, brokers and
private customers."

Source: https://mbsupport.de/


Business recommendation:
------------------------
The vendor provides an updated version to their customers.

An in-depth security analysis performed by security professionals is
highly advised, as the software may be affected from other security issues.


Vulnerability overview/description:
-----------------------------------
1) Stored Cross-Site Scripting (CVE-2022-39172)
An authenticated attacker with privileges of the role 'user' can create a new
'Vorgang' (Process). The field 'Name' is not sanitized and enables an attacker
to perform a stored XSS attack. Additionally, the field 'Hauptverantwortlicher'
(persons mainly responsible) can be used to assign this 'Vorgang' to another user
who will receive it in his overview list. This results in a targeted stored
XSS attack.


Proof of concept:
-----------------
1) Stored Cross-Site Scripting (CVE-2022-39172)
The application is developed on top of Oracle Apex
(https://apex.oracle.com/en/) which provides several security features to
developers. Two of those are request replay protection and parameter
checksumming which make it hard to develop a PoC which only consists of
requests and responses. Therefore this PoC will be a textual description of the
required steps and supplemented with pictures. Additionally the library
'AlertifyJS' is used, which changes the appearance of alert popups which
can be confusing if you are used to the standard alert popups.

To execute the attack the following steps have to be performed:
1. Log in to openVIVA c2
2. Go to 'mein openVIVA' (my openVIVA)
3. Click on 'Vorgangszuordnung' (Process Assignment)
4. Click on 'Neuen Vorgang starten' (Start new Process)
5. In the new form enter the XSS payload into the 'Name' field, for example
"<script>alert('XSS')</script>"
6. Choose your victim as 'Hauptverantwortlicher' (persons mainly responsible)
7. Click on the three dots
8. Click on 'Speichern' (save)

The victim now has a new 'Vorgang' in his inbox. If the 'Vorgänge' menu is clicked,
the victim is redirected to the list of assigned 'Vorgänge'. Because our payload
is in the name field it is executed as soon as the list of processes is loaded.


Vulnerable / tested versions:
-----------------------------
The following version has been tested and found to be vulnerable:
* openVIVA c2 20220101


Vendor contact timeline:
------------------------
2022-03-30: Contacting vendor through email followed by a telephone call,
sent the advisory
2022-04-20: Asking for status update
2022-04-22: Patch release is planned for August
2022-07-26: Statuscall: Patch exists, advisory release delayed until
rollout to all customers is complete (~ August 2023(!))
2023-09-18: Asking for a status update and patch download information.
Vendor response: no public link available; few customers
still have no patch.
2023-09-25: Release of security advisory



Solution:
---------
Upgrade to version 2022-08-01 or later. The vendor has no public
download link available as all customers will be patched according
to their maintenance contract.


Workaround:
-----------
None


Advisory URL:
-------------
https://sec-consult.com/vulnerability-lab/


~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

SEC Consult Vulnerability Lab
An integrated part of SEC Consult, an Eviden business
Europe | Asia

About SEC Consult Vulnerability Lab
The SEC Consult Vulnerability Lab is an integrated part of SEC Consult, an
Eviden business. It ensures the continued knowledge gain of SEC Consult in the
field of network and application security to stay ahead of the attacker. The
SEC Consult Vulnerability Lab supports high-quality penetration testing and
the evaluation of new offensive and defensive technologies for our customers.
Hence our customers obtain the most current information about vulnerabilities
and valid recommendation about the risk profile of new technologies.


~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Interested to work with the experts of SEC Consult? Send us your application
https://sec-consult.com/career/

Interested in improving your cyber security with the experts of SEC Consult?
Contact our local offices https://sec-consult.com/contact/
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Mail: security-research at sec-consult dot com
Web: https://www.sec-consult.com
Blog: https://blog.sec-consult.com
Twitter: https://twitter.com/sec_consult

EOF Daniel Hirschberger / @2023

Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    69 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close