CVE-2023-44915

7.1 HIGH

📋 TL;DR

This cross-site scripting (XSS) vulnerability in c3crm's login page allows attackers to inject malicious scripts that execute in users' browsers when they view error messages. Anyone using c3crm versions up to 3.0.4 is affected, particularly organizations using this CRM software for customer management.

💻 Affected Systems

Products:
  • c3crm
Versions: up to v3.0.4
Operating Systems: all
Default Config Vulnerable: ⚠️ Yes
Notes: All installations with the vulnerable Login.php component are affected regardless of configuration.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal session cookies, perform actions as authenticated users, redirect to malicious sites, or install malware on user systems through the vulnerable login page.

🟠

Likely Case

Session hijacking leading to unauthorized access to CRM data, phishing attacks via login page redirection, or credential theft from legitimate users.

🟢

If Mitigated

With proper input validation and output encoding, the attack would fail to execute scripts, limiting impact to benign error message display.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

XSS payloads can be delivered via login_error parameter without authentication; exploitation requires user interaction with the login page.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: unknown

Vendor Advisory: unknown

Restart Required: No

Instructions:

1. Check for updated version beyond 3.0.4 from official sources. 2. If available, backup data and configuration. 3. Replace vulnerable Login.php with patched version. 4. Test login functionality.

🔧 Temporary Workarounds

Input Validation Filter

all

Add server-side validation to sanitize login_error parameter before display

Modify Login.php around line 108 to filter/escape user input

WAF Rule

all

Implement web application firewall rules to block XSS payloads in login_error parameter

🧯 If You Can't Patch

  • Implement Content Security Policy (CSP) headers to restrict script execution
  • Disable or restrict access to the login page from untrusted networks

🔍 How to Verify

Check if Vulnerable:

Test by injecting <script>alert('XSS')</script> into login_error parameter and checking if script executes

Check Version:

Check c3crm version in configuration files or admin interface

Verify Fix Applied:

Attempt same XSS payload; script should not execute and input should be properly escaped

📡 Detection & Monitoring

Log Indicators:

  • Unusual login_error parameter values containing script tags or JavaScript
  • Multiple failed login attempts with suspicious error messages

Network Indicators:

  • HTTP requests to /Login.php with script payloads in parameters
  • Unexpected redirects from login page

SIEM Query:

source="web_logs" AND uri_path="/Login.php" AND (param="login_error" AND value MATCHES "<script|javascript:")

🔗 References

📤 Share & Export