lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date: Tue, 23 May 2017 11:18:09 +0200
From: SEC Consult Vulnerability Lab <>
To: <>, <>
Subject: [FD] SEC Consult SA-20170523-0 :: Arbitrary File Upload & Stored
 XSS in InvoicePlane

SEC Consult Vulnerability Lab Security Advisory < 20170523-0 >
              title: Arbitrary File Upload & Stored XSS
            product: InvoicePlane
 vulnerable version: 1.4.10
      fixed version: 1.5.2
         CVE number: -
             impact: High
              found: 2017-04-10
                 by: Jasveer Singh (Office Kuala Lumpur)
                     SEC Consult Vulnerability Lab

                     An integrated part of SEC Consult
                     Bangkok - Berlin - Linz - Luxembourg - Montreal - Moscow
                     Kuala Lumpur - Singapore - Vienna (HQ) - Vilnius - Zurich



Vendor description:
"InvoicePlane is a self-hosted open source application for managing your
quotes, invoices, clients and payments."


Business recommendation:
By exploiting the vulnerabilities documented in this advisory, an attacker can
fully compromise the web server which has InvoicePlane installed. Potentially
sensitive invoice data might get exposed through this attack.

SEC Consult recommends not to attach InvoicePlane to the network until a
thorough security review has been performed by security professionals and all
identified issues have been resolved.

Vulnerability overview/description:
1. Arbitrary File Upload
An authenticated user can upload a malicious file to the webserver. It is
possible for an attacker to upload a script which is able to compromise the

2. Stored Cross Site Scripting
This vulnerability allows an authenticated user to inject malicious client
side script which will be executed in the browser of users if they visit
the manipulated site.

Proof of concept:
1. Arbitrary File Upload
Below URL is used to upload the malicious file through the attachment

URL     : http://$DOMAIN/index.php/invoices/view/$INVOICE-ID

2. Stored Cross Site Scripting
The following parameters have been found to be vulnerable against
stored cross site scripting. Furthermore, there exist many more
vulnerable parameters.

The following payload shows a simple alert message box:
URL     : http://$DOMAIN/index.php/clients/view/$Client-ID
PAYLOAD : client_name="onmouseover=prompt("XSS")>

URL     : http://$DOMAIN/index.php/index.php/users/form/$User-ID
PAYLOAD : user_name="onmouseover=prompt("XSS1")>

Vulnerable / tested versions:
InvoicePlane version 1.4.10 has been tested. This version was the latest
at the time the security vulnerabilities were discovered.

Vendor contact timeline:
2017-04-11: Contacting vendor through
2017-04-11: Vendor requests security advisory to be shared over unencrypted
2017-04-23: Vendor released patch version 1.5.0 however not all
            vulnerabilities were fixed properly.
2017-05-07: Patch (1.5.2) released by the vendor which fixes all issues
2017-05-23: Public release of security advisory.

Upgrade to InvoicePlane 1.5.2 as version 1.5.0 doesn't fix all the
identified vulnerabilities:


Advisory URL:


SEC Consult Vulnerability Lab

SEC Consult
Bangkok - Berlin - Linz - Luxembourg - Montreal - Moscow
Kuala Lumpur - Singapore - Vienna (HQ) - Vilnius - Zurich

About SEC Consult Vulnerability Lab
The SEC Consult Vulnerability Lab is an integrated part of SEC Consult. It
ensures the continued knowledge gain of SEC Consult in the field of network
and application security to stay ahead of the attacker. The SEC Consult
Vulnerability Lab supports high-quality penetration testing and the evaluation
of new offensive and defensive technologies for our customers. Hence our
customers obtain the most current information about vulnerabilities and valid
recommendation about the risk profile of new technologies.

Interested to work with the experts of SEC Consult?
Send us your application

Interested in improving your cyber security with the experts of SEC Consult?
Contact our local offices

Mail: research at sec-consult dot com

EOF Jasveer Singh / @2017

Download attachment "smime.p7s" of type "application/pkcs7-signature" (3995 bytes)

Sent through the Full Disclosure mailing list
Web Archives & RSS:

Powered by blists - more mailing lists