Skip to content

code5ecure/CVE-2024-41453_CVE-2024-41454

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

6 Commits
 
 
 
 

Repository files navigation

#CVE-2024-41453

#CVE-2024-41454

ProcessMaker Vulnerabilites (just for education): @ryancooley @velkymx @nolanpro @caleeli

Stored Xss

  1. create a json file with xss payload. image (I uploaded sample file named: sample.json)

2.Send this file to process admin user and request to import thie file as a process. image image image

  1. when admin user import this file and try to archive this process, the malicious javascript code will be executed.

(chrome latest version: Version 126.0.6478.127 (Official Build) (64-bit))

image

It is obvius that in import function there is lack of user input sanitization.

Maliciuos file upload

  1. admin user can upload html file and bypass image restrication in Customize UI, custom login logo upload section. image

  2. this is uploaded file: image

  3. also it is possible to uplaod php file but its not executed. image image

there is lack of proper input validation in uploaders.

About

CVE-2024-41454, CVE-2024-41453

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published