Money Transfer Management System 1.0 - DOM-Based XSS
Summary
| Name | Money Transfer Management System - DOM-Based XSS |
| Code name | Charles |
| Product | Money Transfer Management System |
| Affected versions | Version 1.0 |
| State | Public |
| Release date | 2022-03-15 |
Vulnerability
| Kind | DOM-Based Cross-Site Scripting (XSS) |
| Rule | 371. DOM-Based Cross-Site Scripting (XSS) |
| Remote | Yes |
| CVSSv3 Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N |
| CVSSv3 Base Score | 4.3 |
| Exploit available | No |
| CVE ID(s) | CVE-2022-25221 |
Description
Money Transfer Management System Version 1.0 allows an attacker to inject JavaScript code in the URL and then trick a user into visit the link in order to execute JavaScript code.
Proof of Concept
Steps to reproduce
-
Send the following URL to a victim
http://127.0.0.1/mtms/admin/?page=xss';alert('XSS');// -
If a victim visits the link the JavaScript code will be triggered.
System Information
- Version: Money Transfer Management System version 1.0.
- Operating System: Linux.
- Web Server: Apache
- PHP Version: 7.4
- Database and version: MySQL
Exploit
There is no exploit for the vulnerability but can be manually exploited.
Mitigation
By 2022-03-15 there is not a patch resolving the issue.
Credits
The vulnerability was discovered by Oscar
Uribe from the Offensive
Team of Fluid Attacks.
References
Timeline
2022-02-15
Vulnerability discovered.
2022-02-15
Vendor contacted.
2022-03-15
Public Disclosure.

