Faveo Helpdesk Enterprise 6.0.1 - XSS
7.3
High
Discovered by

Offensive Team, Fluid Attacks
Summary
Full name
Faveo Helpdesk Enterprise 6.0.1 - Privilege Escalation via Stored XSS
Code name
State
Public
Release date
Jun 23, 2023
Affected product
Faveo Helpdesk Enterprise
Affected version(s)
Version 6.0.1
Vulnerability name
Stored cross-site scripting (XSS)
Vulnerability type
Remotely exploitable
Yes
CVSS v3.1 vector string
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N
CVSS v3.1 base score
7.3
Exploit available
Yes
CVE ID(s)
Description
Faveo Helpdesk Enterprise version 6.0.1 allows an attacker with agent permissions to perform privilege escalation on the application. This occurs because the application is vulnerable to stored XSS.
Vulnerability
The application allows an agent to upload HTML code when attempting to upload an image in the agent signature.
The bad thing here is that we cannot access the session cookie from JS. This is because the cookie has the HttpOnly
flag. However, thanks to XSS we can perform actions on behalf of an administrator, we can create users with administrative permissions.
Exploitation
Thanks to XSS and the possibility of creating users with administrative permissions. A malicious agent can send a malicious link to the instance administrator to create an account with administrative permissions, thus managing to elevate privileges in the application.
Our security policy
We have reserved the CVE-2023-1724 to refer to this issue from now on. Disclosure policy
System Information
Version: Faveo Helpdesk Enterprise 6.0.1
Operating System: GNU/Linux
Mitigation
There is currently no patch available for this vulnerability.
References
Vendor page https://github.com/ladybirdweb/faveo-helpdesk/
Timeline
Vulnerability discovered
Mar 30, 2023
Vendor contacted
Mar 30, 2023
Vendor replied
Mar 30, 2023
Public disclosure
Jun 23, 2023