Multiple XSS issues were discovered in Sage XRT Business Exchange 12.4.302 that allow an attacker to execute JavaScript code in the context of other users' browsers. The attacker needs to be authenticated to reach the vulnerable features. An issue is present in the Filters and Display model features (OnlineBanking > Web Monitoring > Settings > Filters / Display models). The name of a filter or a display model is interpreted as HTML and can thus embed JavaScript code, which is executed when displayed. This is a stored XSS. Another issue is present in the Notification feature (OnlineBanking > Configuration > Notifications and alerts > Alerts *). The name of an alert is interpreted as HTML, and can thus embed JavaScript code, which is executed when displayed. This is a stored XSS. (Also, an issue is present in the File download feature, accessible via /OnlineBanking/cgi/isapi.dll/DOWNLOADFRS. When requesting to show the list of downloadable files, the contents of three form fields are embedded in the JavaScript code without prior sanitization. This is essentially a self-XSS.)
References
Link | Resource |
---|---|
https://www.synacktiv.com/sites/default/files/2022-12/sage_xrt_multiple_xss.pdf | Exploit Technical Description Third Party Advisory |
https://www.synacktiv.com/sites/default/files/2022-12/sage_xrt_multiple_xss.pdf | Exploit Technical Description Third Party Advisory |
Configurations
History
21 Nov 2024, 07:09
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-01-01 08:15
Updated : 2024-11-21 07:09
NVD link : CVE-2022-34323
Mitre link : CVE-2022-34323
CVE.ORG link : CVE-2022-34323
JSON object : View
Products Affected
sage
- sage_xrt_business_exchange
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')