{"id":16689,"date":"2021-07-07T16:16:57","date_gmt":"2021-07-07T14:16:57","guid":{"rendered":"https:\/\/herolab-usd.formwandler.rocks\/security-advisories\/usd-2020-0035\/"},"modified":"2021-07-19T14:16:00","modified_gmt":"2021-07-19T12:16:00","slug":"usd-2020-0035","status":"publish","type":"page","link":"https:\/\/herolab.usd.de\/en\/security-advisories\/usd-2020-0035\/","title":{"rendered":"usd-2020-0035"},"content":{"rendered":"<p>[et_pb_section fb_built=\"1\" _builder_version=\"4.9.4\" _module_preset=\"default\" background_color=\"#2E353D\" custom_padding=\"||0px|||\"][et_pb_row _builder_version=\"4.9.4\" _module_preset=\"default\"][et_pb_column type=\"4_4\" _builder_version=\"4.9.4\" _module_preset=\"default\"][et_pb_text _builder_version=\"4.9.4\" _module_preset=\"cc5ac6f4-ebbd-4b3f-bc92-4dfc1f15fe2c\" hover_enabled=\"0\" sticky_enabled=\"0\"]<\/p>\n<h1 class=\"h-custom-headline usd-small-letters h2\"><span>usd-2020-0035 | Gambio GX 4.0.0.0<\/span><\/h1>\n<p><span><\/span><br \/><strong>Advisory ID<\/strong><span>: usd-2020-0035<\/span><br \/><strong>CVE Number<\/strong><span>: CVE-2020-10985<\/span><br \/><strong>Affected Product<\/strong><span>: Gambio GX<\/span><br \/><strong>Affected Version<\/strong><span>: 4.0.0.0<\/span><br \/><strong>Vulnerability Type<\/strong><span>: Stored Cross-Site Scripting (XSS)<\/span><br \/><strong>Security Risk<\/strong><span>: Medium<\/span><br \/><strong>Vendor URL<\/strong><span>: <a href=\"https:\/\/www.gambio.de\/\" target=\"_blank\" rel=\"noopener\">https:\/\/www.gambio.de\/<\/a><\/span><br \/><strong>Vendor Status<\/strong><span>: Fixed in 4.0.1.0 (according to vendor)<\/span><\/p>\n<h3><\/h3>\n<h3>Description<\/h3>\n<p>The open source web application \u201eGambio GX\u201c is contains a XSS vulnerability. In the admin area multiple arguments that are passed while creating a new coupon code are vulnerable to XSS.<\/p>\n<p>Stored cross-site scripting arises when an application receives data from an untrusted source and includes that data within its later HTTP responses in an unsafe way. The transferred inputs are not filtered or encoded before saving or during output.<\/p>\n<p><span><\/span><\/p>\n<h3>Proof of Concept (PoC)<\/h3>\n<p><span>The following request can be send to the web application to create a new coupon. Multiple arguments in the request are vulnerable to XSS. For test purposes the XSS payloads were inserted into to the <\/span><em>coupon_name<\/em><span> and <\/span><em>coupon_desc<\/em><span>\u00a0POST parameters.<\/span><\/p>\n<p>[\/et_pb_text][et_pb_image src=\"https:\/\/herolab.usd.de\/wp-content\/uploads\/sites\/9\/2021\/07\/usd20200035-1.png\" _builder_version=\"4.9.4\" _module_preset=\"default\" title_text=\"usd20200035-1\" hover_enabled=\"0\" sticky_enabled=\"0\"][\/et_pb_image][et_pb_text _builder_version=\"4.9.4\" _module_preset=\"cc5ac6f4-ebbd-4b3f-bc92-4dfc1f15fe2c\" hover_enabled=\"0\" sticky_enabled=\"0\"]<\/p>\n<div class=\"e16902-22 x-container max width\">\n<div class=\"e16902-23 x-column x-sm x-1-1\">\n<h3>Fix<\/h3>\n<p><span>It is possible to filter received user input as strictly as possible based on what is expected or valid input. Another option is to encode user-controllable data in HTTP responses, encode the output to prevent it from being interpreted as active content. Depending on the output context, this might require applying combinations of HTML, URL, JavaScript, and CSS encoding.<\/span><\/p>\n<h3><\/h3>\n<h3>References<\/h3>\n<ul><\/ul>\n<p><a href=\"https:\/\/www.owasp.org\/index.php\/Cross-site_Scripting_(XSS)\" target=\"_blank\" rel=\"noopener\">https:\/\/www.owasp.org\/index.php\/Cross-site_Scripting_(XSS)<\/a><\/p>\n<p>&nbsp;<\/p>\n<h3>Timeline<\/h3>\n<ul>\n<li>2020-03-25 Vulnerability Discovered<\/li>\n<li>2020-03-26 Initial Contact Request<\/li>\n<li>2020-03-26 Advisory submitted to vendor<\/li>\n<li>2020-05-04 Vendor publishes fix in Beta Version of Gambio GX 4.0.1.0 Beta1 <a href=\"https:\/\/tracker.gambio-server.net\/issues\/66736\" target=\"_blank\" rel=\"noopener\">https:\/\/tracker.gambio-server.net\/issues\/66736<\/a><\/li>\n<li>2020-05 Vendor publishes 4.0.1.0 <a href=\"https:\/\/developers.gambio.de\/changelog\/#bugfix4.0.1.0\" target=\"_blank\" rel=\"noopener\">https:\/\/developers.gambio.de\/changelog\/#bugfix4.0.1.0<\/a><\/li>\n<li>2020-06-18\u00a0Security advisory released<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h3>Credits<\/h3>\n<p><span>This security vulnerability was found by Gerbert Roitburd of usd AG.<\/span><\/p>\n<\/div>\n<\/div>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>usd-2020-0035 | Gambio GX 4.0.0.0 Advisory ID: usd-2020-0035CVE Number: CVE-2020-10985Affected Product: Gambio GXAffected Version: 4.0.0.0Vulnerability Type: Stored Cross-Site Scripting (XSS)Security Risk: MediumVendor URL: https:\/\/www.gambio.de\/Vendor Status: Fixed in 4.0.1.0 (according to vendor) Description The open source web application \u201eGambio GX\u201c is contains a XSS vulnerability. In the admin area multiple arguments that are passed while creating [&hellip;]<\/p>\n","protected":false},"author":96,"featured_media":0,"parent":16124,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","inline_featured_image":false,"footnotes":""},"class_list":["post-16689","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/pages\/16689","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/users\/96"}],"replies":[{"embeddable":true,"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/comments?post=16689"}],"version-history":[{"count":0,"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/pages\/16689\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/pages\/16124"}],"wp:attachment":[{"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/media?parent=16689"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}