TOTVS Fluig Platform 1.6.x/1.7.x/1.8.0/1.8.1 mobileredir /mobileredir/openApp.jsp redirectUrl/user cross site scripting
CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
---|---|---|
4.3 | $0-$5k | 0.06 |
A vulnerability was found in TOTVS Fluig Platform 1.6.x/1.7.x/1.8.0/1.8.1. It has been rated as problematic. Affected by this issue is an unknown code block of the file /mobileredir/openApp.jsp of the component mobileredir. The manipulation of the argument redirectUrl/user
with the input value "><script>alert(document.domain)</script>
leads to a cross site scripting vulnerability. Using CWE to declare the problem leads to CWE-79. The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users. Impacted is integrity.
The weakness was shared 11/24/2023. This vulnerability is handled as CVE-2023-6275. Successful exploitation requires user interaction by the victim. Technical details as well as a public exploit are known. The MITRE ATT&CK project declares the attack technique as T1059.007.
It is declared as proof-of-concept. By approaching the search of inurl:mobileredir/openApp.jsp it is possible to find vulnerable targets with Google Hacking.
Upgrading to version 1.7.1-231128, 1.8.0-231127 or 1.8.1-231127 eliminates this vulnerability. The upgrade is hosted for download at tdn.totvs.com.
Product
Vendor
Name
Version
CPE 2.3
CPE 2.2
CVSSv4
VulDB CVSS-B Score: 🔒VulDB CVSS-BT Score: 🔒
VulDB Vector: 🔒
VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 4.4VulDB Meta Temp Score: 4.3
VulDB Base Score: 3.5
VulDB Temp Score: 3.2
VulDB Vector: 🔒
VulDB Reliability: 🔍
NVD Base Score: 6.1
NVD Vector: 🔒
CNA Base Score: 3.5
CNA Vector (VulDB): 🔒
CVSSv2
AV | AC | Au | C | I | A |
---|---|---|---|---|---|
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
---|---|---|---|---|---|
unlock | unlock | unlock | unlock | unlock | unlock |
unlock | unlock | unlock | unlock | unlock | unlock |
unlock | unlock | unlock | unlock | unlock | unlock |
VulDB Base Score: 🔒
VulDB Temp Score: 🔒
VulDB Reliability: 🔍
NVD Base Score: 🔒
Exploiting
Class: Cross site scriptingCWE: CWE-79 / CWE-74 / CWE-707
CAPEC: 🔒
ATT&CK: 🔒
Local: No
Remote: Yes
Availability: 🔒
Access: Public
Status: Proof-of-Concept
Google Hack: 🔒
EPSS Score: 🔒
EPSS Percentile: 🔒
Price Prediction: 🔍
Current Price Estimation: 🔒
0-Day | unlock | unlock | unlock | unlock |
---|---|---|---|---|
Today | unlock | unlock | unlock | unlock |
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: UpgradeStatus: 🔍
0-Day Time: 🔒
Upgrade: Fluig Platform 1.7.1-231128/1.8.0-231127/1.8.1-231127
Timeline
11/24/2023 Advisory disclosed11/24/2023 CVE reserved
11/24/2023 VulDB entry created
12/16/2023 VulDB entry last update
Sources
Status: ConfirmedCVE: CVE-2023-6275 (🔒)
scip Labs: https://www.scip.ch/en/?labs.20161013
Entry
Created: 11/24/2023 08:45Updated: 12/16/2023 14:17
Changes: 11/24/2023 08:45 (42), 12/12/2023 18:49 (6), 12/14/2023 14:58 (1), 12/15/2023 06:39 (2), 12/16/2023 14:13 (2), 12/16/2023 14:17 (28)
Complete: 🔍
Submitter: erickfernandox
Cache ID: 3:33A:103
Submit
Accepted
- Submit #236496: Totvs TOTVS Fluig Plataform 1.6.X - 1.8.1 Cross-Site Scripting (by erickfernandox)
No comments yet. Languages: en.
Please log in to comment.