Plateforme
php
Composant
facturascripts
Corrigé dans
2022.04
CVE-2022-1457 is a critical stored Cross-Site Scripting (XSS) vulnerability affecting facturascripts versions up to and including 2022.04. This vulnerability allows attackers to inject malicious scripts into the application, potentially leading to data theft or malware installation. A patch was released in version 2022.04, addressing this security flaw.
The impact of this XSS vulnerability is significant. An attacker can inject arbitrary JavaScript code into the EditUser and EditProducto pages of facturascripts. This malicious code can then be executed in the context of a user's browser when they visit the affected page. This allows the attacker to steal sensitive information, such as session cookies, and impersonate legitimate users. Furthermore, the attacker could redirect users to malicious websites, deface the application, or even install malware on the user's machine. The potential for data exfiltration and account takeover makes this a high-priority vulnerability to address.
CVE-2022-1457 was publicly disclosed on April 25, 2022. There are currently no known active campaigns exploiting this vulnerability, but the ease of exploitation and the potential impact suggest it remains a significant risk. No public proof-of-concept (POC) code has been widely published, but the vulnerability is relatively straightforward to exploit, increasing the likelihood of future exploitation. The vulnerability is not listed on the CISA KEV catalog at the time of this writing.
Organizations using facturascripts for invoice generation and management are at risk, particularly those running versions prior to 2022.04. Shared hosting environments where multiple users share the same facturascripts installation are especially vulnerable, as an attacker could potentially compromise other users' accounts through this XSS vulnerability.
• generic web: Use curl to test the EditUser and EditProducto endpoints with a simple XSS payload (e.g., <script>alert(1)</script>) in the 'title' parameter. Examine the response for signs of script execution.
curl 'http://your-facturascripts-instance/edit_user.php?title=<script>alert(1)</script>'• generic web: Review access logs for requests containing suspicious characters or patterns in the 'title' parameter, such as <script> or javascript:.
• php: Examine the source code of edituser.php and editproducto.php for the handling of the 'title' parameter. Look for missing or inadequate input validation and output encoding.
disclosure
Statut de l'Exploit
EPSS
0.37% (percentile 59%)
Vecteur CVSS
The primary mitigation for CVE-2022-1457 is to immediately upgrade facturascripts to version 2022.04 or later. If upgrading is not immediately feasible, consider implementing input validation and output encoding on the 'title' parameter in the EditUser and EditProducto pages. Web Application Firewalls (WAFs) configured to detect and block XSS payloads can also provide a temporary layer of protection. Review access logs for suspicious activity, particularly requests containing unusual characters in the 'title' parameter. After upgrading, confirm the vulnerability is resolved by attempting to inject a simple XSS payload (e.g., <script>alert(1)</script>) into the 'title' field and verifying that the script is not executed.
Actualice facturascripts a la versión 2022.04 o posterior. Esta versión contiene una corrección para la vulnerabilidad XSS almacenada en los parámetros de título de las páginas EditUser y EditProducto. La actualización eliminará el riesgo de que un atacante inyecte código malicioso en su aplicación.
Analyses de vulnérabilités et alertes critiques directement dans votre boîte mail.
CVE-2022-1457 is a critical stored XSS vulnerability in facturascripts versions up to 2022.04, allowing attackers to inject malicious scripts via the 'title' parameter.
You are affected if you are running facturascripts versions prior to 2022.04. Upgrade immediately to mitigate the risk.
Upgrade facturascripts to version 2022.04 or later. Implement input validation and output encoding as a temporary workaround if upgrading is not immediately possible.
While no active campaigns are currently known, the vulnerability's ease of exploitation makes it a potential target.
Refer to the facturascripts GitHub repository for updates and advisories: https://github.com/neorazorx/facturascripts
Téléverse ton fichier de dépendances et découvre instantanément si cette CVE et d'autres te touchent.