Multiple XSS in CandidATS leads to account takeover
8.8
High
Discovered by

Offensive Team, Fluid Attacks
Summary
Full name
Multiple XSS in CandidATS leads to account takeover
Code name
State
Public
Release date
Oct 26, 2022
Affected product
CandidATS
Affected version(s)
Version 3.0.0
Vulnerability name
Reflected cross-site scripting (XSS)
Vulnerability type
Remotely exploitable
Yes
CVSS v3.1 vector string
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVSS v3.1 base score
8.8
Exploit available
Yes
CVE ID(s)
Description
CandidATS version 3.0.0 allows an external attacker to steal the cookie of arbitrary users. This is possible because the application application does not properly validate user input against XSS attacks.
Vulnerability
The XSS present in CandidATS 3.0.0, allows an unauthenticated remote attacker to perform an Account Takeover. To trigger this vulnerability, we will need to send the following malicious link to an administrator in order to hack their account:
During the investigation, several parameters of the above URL were found to be vulnerable to XSS:
indexFile (CVE-2022-42746)
sortBy (CVE-2022-42747)
sortDirection (CVE-2022-42748)
page (CVE-2022-42749)
Different CVE-IDs were reserved for these vulnerabilities because when analyzing the source code, we realized that each of these flaws is fixed independently.
Exploitation
In this attack we will obtain the administrator user account, through a malicious link:

Our security policy
We have reserved the CVE-2022-42746, CVE-2022-42747, CVE-2022-42748, CVE-2022-42749 to refer to these issues from now on. Disclosure policy
System Information
Version: CandidATS 3.0.0
Operating System: GNU/Linux
Mitigation
There is currently no patch available for this vulnerability.
References
Vendor page https://candidats.net/
Timeline
Vulnerability discovered
Oct 7, 2022
Vendor contacted
Oct 7, 2022
Vendor replied
Oct 7, 2022
Public disclosure
Oct 26, 2022