CVE-2020-36085

6.3 MEDIUM

📋 TL;DR

This stored XSS vulnerability in Egavilan Media Resumes Management and Job Application Website 1.0 allows attackers to inject malicious JavaScript code via the First and Last Name fields in job applications. When administrators or other users view these applications, the malicious code executes in their browsers. Organizations using this specific version of the software are affected.

💻 Affected Systems

Products:
  • Egavilan Media Resumes Management and Job Application Website
Versions: 1.0
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability exists in the default installation and requires no special configuration to be exploitable.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal administrator session cookies, take over administrative accounts, deface the website, or redirect users to malicious sites, potentially leading to complete system compromise.

🟠

Likely Case

Attackers will steal session cookies to hijack administrator accounts, modify website content, or access sensitive applicant data stored in the system.

🟢

If Mitigated

With proper input validation and output encoding, the malicious scripts would be rendered harmless as text rather than executable code.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The exploit requires submitting a job application with malicious JavaScript in the name fields, which is trivial for attackers.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Unknown

Restart Required: No

Instructions:

No official patch is available. Implement input validation and output encoding in the application code to sanitize user inputs.

🔧 Temporary Workarounds

Web Application Firewall (WAF) Rules

all

Configure WAF to block XSS payloads in form submissions

Input Validation Filter

all

Add server-side validation to reject HTML/JavaScript in name fields

🧯 If You Can't Patch

  • Disable the job application feature entirely
  • Implement Content Security Policy (CSP) headers to restrict script execution

🔍 How to Verify

Check if Vulnerable:

Submit a job application with <script>alert('XSS')</script> in the First Name field and check if the script executes when viewed by administrators.

Check Version:

Check the software version in the admin panel or configuration files.

Verify Fix Applied:

Test the same payload after implementing fixes to ensure it displays as plain text rather than executing.

📡 Detection & Monitoring

Log Indicators:

  • Unusual length or special characters in name fields of job applications
  • Multiple submissions from same IP with similar payloads

Network Indicators:

  • HTTP POST requests to application forms containing script tags or JavaScript code

SIEM Query:

source="web_logs" AND (method="POST" AND uri="*apply*" AND (body="*<script>*" OR body="*javascript:*"))

🔗 References

📤 Share & Export