{"id":24260,"date":"2025-06-27T16:08:17","date_gmt":"2025-06-27T14:08:17","guid":{"rendered":"https:\/\/herolab.usd.de\/security-advisories\/usd-2025-0026\/"},"modified":"2025-07-01T10:26:28","modified_gmt":"2025-07-01T08:26:28","slug":"usd-2025-0026","status":"publish","type":"page","link":"https:\/\/herolab.usd.de\/en\/security-advisories\/usd-2025-0026\/","title":{"rendered":"usd-2025-0026"},"content":{"rendered":"<p>[et_pb_section fb_built=\"1\" _builder_version=\"4.21.0\" _module_preset=\"default\" background_color=\"#2E353D\" custom_padding=\"||0px|||\" global_colors_info=\"{}\"][et_pb_row _builder_version=\"4.25.2\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_column type=\"4_4\" _builder_version=\"4.21.0\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_text _builder_version=\"4.27.4\" _module_preset=\"default\" custom_padding=\"||13px|||\" global_colors_info=\"{}\"]<\/p>\n<h1>usd-2025-0026 | Agorum core open 11.9.1.3-1857 - Improper Neutralization of Input During Web Page Generation (Cross-site Scripting)<\/h1>\n<h1><\/h1>\n<p><strong>Product<\/strong>: Agorum core open<br \/><strong>Affected Version<\/strong>: 11.9.1.3-1857<br \/><strong>Vulnerability Type<\/strong>: Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) (CWE-79)<br \/><strong>Security Risk<\/strong>: High<br \/><strong>Vendor<\/strong>: Agorum<br \/><strong>Vendor URL<\/strong>: <a href=\"https:\/\/www.agorum.com\/\" target=\"_blank\" rel=\"noopener\">https:\/\/www.agorum.com\/<\/a><br \/><strong>Vendor acknowledged vulnerability<\/strong>: Yes<br \/><strong>Vendor Status<\/strong>: Fixed<br \/><strong>CVE Number<\/strong>: Requested<br \/><strong>CVE Link<\/strong>: Requested<br \/><strong>Advisory ID<\/strong>: usd-2025-0026<\/p>\n<h3>Description<\/h3>\n<p><!-- add a description of the application and vulnerability -->agorum core is an open-source Enterprise Content Management (ECM) system developed by agorum Software GmbH in Germany. It offers a modular, highly customizable platform for document management, workflow automation, and digital collaboration.<\/p>\n<h3>Proof of Concept<\/h3>\n<p><!-- describe how the vulnerability can be exploited, feel free to add supporting images etc. -->agorum core is affected by numerous reflected cross-site scripting (XSS) vulnerabilities across a wide range of parameters, indicating a lack of proper input sanitization and output encoding. These flaws can be exploited by attackers to inject malicious scripts, potentially compromising user sessions, stealing credentials, or defacing content. The widespread nature of the vulnerabilities suggests systemic issues in the application's input handling architecture.<\/p>\n<p>The following request can be crafted and sent to a victim. When opened, it executes JavaScript within the context of the victim\u2019s browser session:<\/p>\n<div class=\"codehilite\" style=\"background: #263238;color: #eff\">\n<pre style=\"line-height: 125%\"><span style=\"background: #263238\"><\/span><span class=\"nf\" style=\"background: #263238;color: #82aaff\">GET<\/span> <span class=\"nn\" style=\"background: #263238;color: #ffcb6b\">\/roiwebui\/roiwebui_module\/BeginSSOLogin.jsp?userName=%22);}alert(document.domain);%3C\/script%3E<\/span> <span class=\"kr\" style=\"background: #263238;color: #bb80b3\">HTTP<\/span><span class=\"o\" style=\"background: #263238;color: #89ddff\">\/<\/span><span class=\"m\" style=\"background: #263238;color: #f78c6c\">1.1<br \/><\/span><span class=\"na\" style=\"background: #263238;color: #bb80b3\">Host<\/span><span class=\"o\" style=\"background: #263238;color: #89ddff\">:<\/span> <span class=\"l\" style=\"background: #263238;color: #c3e88d\">localhost<br \/><\/span><span class=\"err\" style=\"background: #263238;color: #ff5370\">[...]<\/span><\/pre>\n<\/div>\n<p>In the server's response, the user-supplied JavaScript is reflected and executed, resulting in an alert dialog, as demonstrated in the screenshot below:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/herolab.usd.de\/wp-content\/uploads\/sites\/9\/2025\/06\/xss.png\" width=\"1186\" height=\"409\" alt=\"\" class=\"wp-image-24093 alignnone size-full\" srcset=\"https:\/\/herolab.usd.de\/wp-content\/uploads\/sites\/9\/2025\/06\/xss.png 1186w, https:\/\/herolab.usd.de\/wp-content\/uploads\/sites\/9\/2025\/06\/xss-980x338.png 980w, https:\/\/herolab.usd.de\/wp-content\/uploads\/sites\/9\/2025\/06\/xss-480x166.png 480w\" sizes=\"(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) and (max-width: 980px) 980px, (min-width: 981px) 1186px, 100vw\" \/><\/p>\n<p>As previously mentioned, the payload above is provided as an example. There are numerous other endpoints that exhibit the same vulnerability. A non-exhaustive list includes:<\/p>\n<ul>\n<li>OpenDocumentMessage.jsp<\/li>\n<li>ShowSSOMessageBox.jsp<\/li>\n<li>SSO.jsp<\/li>\n<li>SSOConvertToPdf.jsp<\/li>\n<li>SSOFileListStart.jsp<\/li>\n<li>SSOPageStart.jsp<\/li>\n<li>SSOKeepAlive.jsp<\/li>\n<li>SSOPortal.jsp<\/li>\n<li>SSOPortalWindow.jsp<\/li>\n<li>SSOPortalTabFrameSet.jsp<\/li>\n<li>SSOSearchMask.jsp<\/li>\n<li>SSOSearchMaskStart.jsp<\/li>\n<li>ReExtendedSearch.jsp<\/li>\n<li>ClientNewWindowsLoader.jsp<\/li>\n<li>RSSReader.jsp<\/li>\n<li>ReportingFrameSet.jsp<\/li>\n<\/ul>\n<h3>Fix<\/h3>\n<p><!-- how the vendor can fix the vulnerability.--><br \/><!-- if you recommended a quick workaround to the customer (and they are fine with you including it here!) feel free to add this information as well -->It is strongly recommended to implement robust input validation and output encoding across all user-supplied parameters. Adopt a security-focused development framework or library that provides built-in protections against XSS, and ensure that all dynamic content rendered in the browser is properly escaped based on context (e.g., HTML, JavaScript, URL).<\/p>\n<p>&nbsp;<\/p>\n<p>Users of agorum core open can upgrade to versions 11.9.2 and 11.10.1.<\/p>\n<h3>References<\/h3>\n<p><!-- add references to the application and vulnerability.--><\/p>\n<ul>\n<li><a href=\"https:\/\/cwe.mitre.org\/data\/definitions\/79.html\" target=\"_blank\" rel=\"noopener\">https:\/\/cwe.mitre.org\/data\/definitions\/79.html<\/a><\/li>\n<\/ul>\n<h3>Timeline<\/h3>\n<ul>\n<li><strong>2025-05-05<\/strong>: First contact request via mail.<\/li>\n<li><strong>2025-05-05<\/strong>: The vendor has confirmed the delivery and has begun investigating the matter.<\/li>\n<li><strong>2025-05-07<\/strong>: The vendor has begun addressing and fixing the issue.<\/li>\n<li><strong>2025-05-15<\/strong>: The vendor has addressed and fixed the vulnerability within the cloud instances.<\/li>\n<li><strong>2025-05-30<\/strong>: The vendor released fixed versions 11.9.2 and 11.10.1.<\/li>\n<li><strong>2025-06-27<\/strong>: This advisory is published.<\/li>\n<\/ul>\n<h3>Credits<\/h3>\n<p><!-- add the names of the persons that discovered the vulnerability. This information will be sent to the vendor and published on the HeroLab blog -->This security vulnerability was identified by Jakob Steeg, Roman Hergenreder, Florian Kimmes, Kai Glauber, DR and Ole Wagner of usd AG.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>usd-2025-0026 | Agorum core open 11.9.1.3-1857 - Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) Product: Agorum core openAffected Version: 11.9.1.3-1857Vulnerability Type: Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) (CWE-79)Security Risk: HighVendor: AgorumVendor URL: https:\/\/www.agorum.com\/Vendor acknowledged vulnerability: YesVendor Status: FixedCVE Number: RequestedCVE Link: RequestedAdvisory ID: usd-2025-0026 Description agorum core is [&hellip;]<\/p>\n","protected":false},"author":118,"featured_media":0,"parent":16124,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","inline_featured_image":false,"footnotes":""},"class_list":["post-24260","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/pages\/24260","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/users\/118"}],"replies":[{"embeddable":true,"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/comments?post=24260"}],"version-history":[{"count":3,"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/pages\/24260\/revisions"}],"predecessor-version":[{"id":24264,"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/pages\/24260\/revisions\/24264"}],"up":[{"embeddable":true,"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/pages\/16124"}],"wp:attachment":[{"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/media?parent=24260"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}