XSS Vulnerabilities in Booked Scheduler

Information

Advisory by Netsparker (now Invicti)
Name: XSS Vulnerabilities in Booked Scheduler
Software: Booked Scheduler v2.5.6 and possibly below.
Vendor Homepage: http://www.bookedscheduler.com/
Vulnerability Type: Cross-site Scripting
Severity: Critical
Researcher: Omar Kurt
Advisory Reference: NS-14-022

Description

Booked (formerly phpScheduleIt) is a simple but powerful reserve-anything scheduler. With flexible layouts, custom rules, a powerful administrative backend, and an unbelievably simple user experience, Booked can fit almost any need. From conference rooms to lab equipment to airplanes – it’s Booked.

Details

Booked Scheduler is affected by XSS vulnerabilities in version v2.5.6.
Booked Scheduler PoC urls are as follows:

  • Cross-site Scripting
    http://example.com/Web/index.php?redirect='"--></style></scRipt><scRipt>alert(0x00034C)</scRipt>

You can read the full article about Cross-site Scripting vulnerabilities from here:

Solution

http://sourceforge.net/p/phpscheduleit/code/2468/

Advisory Timeline

09/06/2014 – First Contact
09/06/2014 – Second Contact
09/06/2014 – Vulnerability fixed
23/06/2014 – Advisory released

Credits

It has been discovered on testing of Invicti Web Application Security Scanner.

About Invicti

Invicti® can find and report security issues such as SQL Injection and Cross-site Scripting (XSS) in all web applications regardless of the platform and the technology they are built on. Invicti’s unique detection and exploitation techniques allows it to be dead accurate in reporting hence it’s the first and the only False Positive Free web application security scanner.