phpIPAM 1.4.4 - Stored XSS
4,8
Medium
Discovered by
Offensive Team, Fluid Attacks
Summary
Full name
phpIPAM 1.4.4 - Stored XSS
Code name
State
Public
Release date
18 ene 2022
Affected product
phpIPAM
Affected version(s)
1.4.4
Fixed version(s)
1.4.5
Vulnerability name
Stored cross-site scripting (XSS)
Vulnerability type
Remotely exploitable
Yes
CVSS v3.1 vector string
CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N
CVSS v3.1 base score
4.8
Exploit available
No
CVE ID(s)
Description
phpIPAM v1.4.4 allows an authenticated admin user to inject persistent javascript code inside the "Site title" parameter while updating the site settings. The "Site title" setting is injected in several locations which triggers the XSS.
Proof of Concept
Steps to reproduce:
XSS:
Go to
"http://192.168.1.5/phpipam/index.php?page=administration§ion=settings"
.Update the "Site Title" parameter with
" autofocus onfocus=alert(1)>
.Click on 'Save'.
If a user visits the settings page the javascript code will be rendered.
Open redirect:
Go to
"http://192.168.1.5/phpipam/index.php?page=administration§ion=settings"
.Update the "Site Title" parameter with
0;url=https://google.com" http-equiv="refresh"
.Click on 'Save'.
If a user reloads the page, they will be redirected to
https://google.com
.
System Information
Version: phpIPAM IP address management v1.4.4.
Operating System: Linux.
Web Server: Apache
PHP Version: 7.4
Database and version: Mysql
Exploit
There is no exploit for the vulnerability but can be manually exploited.
Mitigation
An updated version of phpIPAM is available at the vendor page.
References
Vendor page https://phpipam.net/
Patched version https://github.com/phpipam/phpipam/releases/tag/v1.4.5
Timeline
IA generativa
6 ene 2022
Vulnerability patched
17 ene 2022
Vendor contacted
7 ene 2022
Vendor replied
7 ene 2022
Public disclosure
18 ene 2022