# Exploit Title: OpenDocMan 18.104.22.168 Stored/Reflective XSS # Date: 05/04/2013 # Exploit Author: drone (@dronesec) # More Exploit Information: # Vendor Homepage: http://www.opendocman.com/ # Software Link: http://sourceforge.net/projects/opendocman/files/opendocman/22.214.171.124/opendocman-126.96.36.199.zip/download # Version: 188.8.131.52 About the Application: ====================== OpenDocMan is a free, open source web-based PHP document management system (DMS) designed to comply with ISO 17025 and OIE standard for document management. It features web based access, fine grained control of access to files, and automated install and upgrades. Vulnerability Details: ====================== OpenDocMan is vulnerable to stored XSS, allowing any user the ability to upload malicious scripts. When adding a new file, a user can enter a malicious Description or Comment field input. Insufficient sanitization allows the following XSS to slip by: <sc<script>ript>alert(document.cookie)</sc<script>ript> This value is then stored, and any user viewing it is affected. Admin's who are required to approve documents, or view them, are also affected. Stored XSS also exists when generating new Departments; by inserting a malicious Department name like above, arbitrary code can be remotely executed to visitors. Reflective XSS exists in the error.php page. By submitting the following request, an alert is generated: http://localhost/opendocman/error.php?ec=13&last_message=%3Csc%3Cscript%3Eript%3Ealert%281%29%3C/sc%3Cscript%3Eript%3E Timeline: ==================== 05/04/13 > Sent email to developers 05/04/13 > Confirmed. Version 184.108.40.206 released.
Related ExploitsTrying to match OSVDBs (2): 93052, 93053
Trying to match setup file: 37e6f976132015f9fa1398a46678808c
Other Possible E-DB Search Terms: OpenDocMan 220.127.116.11, OpenDocMan