Skip to content

Instantly share code, notes, and snippets.

@picar0jsu
Last active December 20, 2022 19:41
Show Gist options
  • Star 1 You must be signed in to star a gist
  • Fork 0 You must be signed in to fork a gist
  • Save picar0jsu/4532a6d15e8f8d7597b7dca5136ad655 to your computer and use it in GitHub Desktop.
Save picar0jsu/4532a6d15e8f8d7597b7dca5136ad655 to your computer and use it in GitHub Desktop.
Multiple stored cross-site scripting (XSS) vulnerabilities in Sage EasyPay 10.7.5.10
[Suggested description]
Multiple stored cross-site scripting (XSS) vulnerabilities in Sage
EasyPay 10.7.5.10 allow authenticated attackers to inject arbitrary
web script or HTML via multiple parameters through Unicode
Transformations (Best-fit Mapping), as demonstrated by the full-width
variants of the less-than sign (%EF%BC%9C) and greater-than sign
(%EF%BC%9E).
------------------------------------------
[Vulnerability Type]
Cross Site Scripting (XSS)
------------------------------------------
[Vendor of Product]
SAGE
------------------------------------------
[Affected Product Code Base]
EasyPay - 10.7.5.10
------------------------------------------
[Attack Type]
Remote
------------------------------------------
[Impact Escalation of Privileges]
true
------------------------------------------
[Attack Vectors]
To exploit vulnerability, an authenticated attacker can inject
JavaScript into input fields with full-width variant of the
lesser-than sign (%EF%BC%9C) and greater-than sign (%EF%BC%9E) to
bypass security measures in place.
------------------------------------------
[Reference]
https://www.sage.com/en-sg/products/sage-easypay/
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment