Aerosol Posted March 10, 2015 Report Posted March 10, 2015 # Exploit Title: OpenKM Platform Remote Reflected Cross Site Scripting# Google Dork: N/A# Date: 18-11-2014# Exploit Author: Mohamed Abdelbaset Elnoby (@SymbianSyMoh)# Vendor Homepage: http://www.openkm.com/en<http://s.bl-1.com/h/mQ2bNXq?url=http://www.openkm.com/en>/# Software Link: http://www.openkm.com/en/download-english.html<http://s.bl-1.com/h/mQ2bTws?url=http://www.openkm.com/en/download-english.html># Version: All versions < 6.4.19 (built 23338)# Tested on: All OS# CVE : 2014-9017-About OpenKMOpenKM is a Free/Libre document management system that provides a webinterface for managing arbitrary files. OpenKM includes a contentrepository, Lucene indexing, and jBPM workflow. The OpenKM system wasdeveloped using Java technology.In 2005 two developers involved in open source technologies and expertisewith some commercial document management solutions (Sharepoint, Documentum,Hummingbird, among others) like Excalibur search engine or Kofax OCR enginedecided to start an open source project based on high level technologies tobuild a document management system that they decided to call OpenKM."-Wikipedia"-Reference: http://en.wikipedia.org/wiki/OpenKM<http://s.bl-1.com/h/mQ2bYKv?url=http://en.wikipedia.org/wiki/OpenKM>-Vulnerability: Remote Reflected/Stored Cross Site Scripting with no remoteinteraction-Severity: Very Critical-Vulnerable Parameter(s)/Input(s): Tasks-Info: https://www.owasp.org/index.php/Cross-site_Scripting_%28XSS%29<http://s.bl-1.com/h/mQ2cfkx?url=https://www.owasp.org/index.php/Cross-site_Scripting_%28XSS%29>-Impact: Remote Admin or Users Full Account Takeover with no interaction.-Attack Scenario:1. User#1 "Attacker" : Creates a task with a vulnerable name and assign itto another User/Admin "Targeted Victim".2. User#2 "Victim" : Got Exploited with the vulnerable Task made by theAttacker "User#1" since the Task notification will automatically appears tothe assigned user side "Victim" also the notification popup displays thevulnerable task name and the victim will be exploited with no interactions.-PS: This is the most critical attack you will see on OpenKM platformbecause it will work remotely against users even with the same scenariodescribed in the report you can steal/execute a JS in the Administrator'ssession.-PoC Video: http://youtu.be/3jBQFAAq23kThanks-- *Best Regards**,**,**Mohamed Abdelbaset Elnoby*Guru Programmer, Information Security Evangelist& Bug Bounty Hunter.LinkedIn<http://s.bl-1.com/h/mQ2ck6z?url=https://www.linkedin.com/in/symbiansymoh>CurriculumVitae <http://s.bl-1.com/h/mQ2coW1?url=http://goo.gl/cNrVpL><http://s.bl-1.com/h/mQ2ctv3?url=https://www.linkedin.com/in/symbiansymoh>Facebook<http://s.bl-1.com/h/mQ2cyJ5?url=https://fb.com/symbiansymoh>Twitter<http://s.bl-1.com/h/mQ2c3j7?url=https://twitter.com/symbiansymoh>Source Quote