Faveo Helpdesk Enterprise 6.0.1 - XSS
Summary
Name | Faveo Helpdesk Enterprise 6.0.1 - Privilege Escalation via Stored XSS |
Code name | |
Product | Faveo Helpdesk Enterprise |
Affected versions | Version 6.0.1 |
State | Public |
Release date | 2023-06-23 |
Vulnerability
Kind | Stored cross-site scripting (XSS) |
Rule | |
Remote | Yes |
CVSSv3.1 Vector | CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N |
CVSSv3.1 Base Score | 7.3 |
Exploit available | Yes |
CVE ID(s) |
Description
Faveo Helpdesk Enterprise version 6.0.1 allows an attacker with agent permissions to perform privilege escalation on the application. This occurs because the application is vulnerable to stored XSS.
Vulnerability
The application allows an agent to upload HTML code when attempting to upload an image in the agent signature.
The bad thing here is that we cannot access the session cookie from JS. This is because the cookie has the HttpOnly
flag. However, thanks to XSS we can perform actions on behalf of an administrator, we can create users with administrative permissions.
Exploitation
Thanks to XSS and the possibility of creating users with administrative permissions. A malicious agent can send a malicious link to the instance administrator to create an account with administrative permissions, thus managing to elevate privileges in the application.
Our security policy
We have reserved the CVE-2023-1724 to refer to this issue from now on.
System Information
-
Version: Faveo Helpdesk Enterprise 6.0.1
-
Operating System: GNU/Linux
Mitigation
There is currently no patch available for this vulnerability.
Credits
The vulnerability was discovered by Carlos Bello from Fluid Attacks' Offensive Team.
References
Vendor page https://github.com/ladybirdweb/faveo-helpdesk/
Timeline
2023-03-30
Vulnerability discovered.
2023-03-30
Vendor contacted.
2023-03-30
Vendor replied acknowledging the report.
2023-06-23
Public Disclosure.