<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="chinese">
	<id>https://pwnwiki.com/index.php?action=history&amp;feed=atom&amp;title=SIS-REWE_GO_version_7.5.0_and_12C_XSS%E6%BC%8F%E6%B4%9E</id>
	<title>SIS-REWE GO version 7.5.0 and 12C XSS漏洞 - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://pwnwiki.com/index.php?action=history&amp;feed=atom&amp;title=SIS-REWE_GO_version_7.5.0_and_12C_XSS%E6%BC%8F%E6%B4%9E"/>
	<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=SIS-REWE_GO_version_7.5.0_and_12C_XSS%E6%BC%8F%E6%B4%9E&amp;action=history"/>
	<updated>2026-04-10T04:10:15Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.35.1</generator>
	<entry>
		<id>https://pwnwiki.com/index.php?title=SIS-REWE_GO_version_7.5.0_and_12C_XSS%E6%BC%8F%E6%B4%9E&amp;diff=2798&amp;oldid=prev</id>
		<title>Pwnwiki: Created page with &quot;==XSS== &lt;pre&gt; SEC Consult Vulnerability Lab Security Advisory &lt; 20210511-0 &gt; =======================================================================                title: Refl...&quot;</title>
		<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=SIS-REWE_GO_version_7.5.0_and_12C_XSS%E6%BC%8F%E6%B4%9E&amp;diff=2798&amp;oldid=prev"/>
		<updated>2021-05-12T09:02:50Z</updated>

		<summary type="html">&lt;p&gt;Created page with &amp;quot;==XSS== &amp;lt;pre&amp;gt; SEC Consult Vulnerability Lab Security Advisory &amp;lt; 20210511-0 &amp;gt; =======================================================================                title: Refl...&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;==XSS==&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
SEC Consult Vulnerability Lab Security Advisory &amp;lt; 20210511-0 &amp;gt;&lt;br /&gt;
=======================================================================&lt;br /&gt;
               title: Reflected Cross-site Scripting Vulnerabilities&lt;br /&gt;
             product: SIS Informatik - REWE GO&lt;br /&gt;
  vulnerable version: 7.5.0/12C&lt;br /&gt;
       fixed version: 7.7 SP17&lt;br /&gt;
          CVE number: CVE-2021-31537&lt;br /&gt;
              impact: Medium&lt;br /&gt;
            homepage:https://sisinformatik.com/rewe-go/&lt;br /&gt;
               found: 2021-02-12&lt;br /&gt;
                  by: Steffen Robertz (Office Vienna)&lt;br /&gt;
                      Florian Lienhart (Office Vienna)&lt;br /&gt;
                      SEC Consult Vulnerability Lab&lt;br /&gt;
&lt;br /&gt;
                      An integrated part of SEC Consult, an Atos company&lt;br /&gt;
                      Europe | Asia | North America&lt;br /&gt;
&lt;br /&gt;
                      https://www.sec-consult.com&lt;br /&gt;
&lt;br /&gt;
=======================================================================&lt;br /&gt;
&lt;br /&gt;
Vendor description:&lt;br /&gt;
-------------------&lt;br /&gt;
&amp;quot;SIS Informatik is your specialist for the conception and implementation&lt;br /&gt;
  of tailor-made accounting, business intelligence and corporate&lt;br /&gt;
performance management solutions. In addition to technical competence,&lt;br /&gt;
business know-how and the willingness to develop optimal, adaptable&lt;br /&gt;
software solutions together with our customers are the central&lt;br /&gt;
components that make us a strong partner. We develop solutions based on&lt;br /&gt;
high-quality technologies from well-known partners such as IBM, Oracle&lt;br /&gt;
and Qlik&amp;quot; (translated from German)&lt;br /&gt;
&lt;br /&gt;
Source:https://sisinformatik.com/unternehmen/&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Business recommendation:&lt;br /&gt;
------------------------&lt;br /&gt;
The vendor provides a patch which should be installed immediately.&lt;br /&gt;
&lt;br /&gt;
SEC Consult recommends to perform a thorough security review of these products&lt;br /&gt;
conducted by security professionals to identify and resolve all security&lt;br /&gt;
issues.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Vulnerability overview/description:&lt;br /&gt;
-----------------------------------&lt;br /&gt;
1) Multiple Reflected Cross-site Scripting (XSS) (CVE-2021-31537)&lt;br /&gt;
The login website returns unfiltered or unescaped user input. This leads to a&lt;br /&gt;
reflected cross-site scripting (XSS) vulnerability.&lt;br /&gt;
An attacker can inject arbitrary HTML or JavaScript code into the victim's&lt;br /&gt;
web browser. Once the victim clicks on a malicious link, the attacker's code&lt;br /&gt;
is executed in the context of the victim's web browser.&lt;br /&gt;
&lt;br /&gt;
Proof of concept:&lt;br /&gt;
-----------------&lt;br /&gt;
1) Multiple Reflected Cross-site Scripting (XSS) (CVE-2021-31537)&lt;br /&gt;
When opening the following URL the supplied JavaScript code will be executed.&lt;br /&gt;
/rewe/prod/web/index.php?config=rewe2%22%3E%3Cscript%3Ealert(%22document.domain%22)%3C/script%3E&amp;amp;version=7.5.0&amp;amp;win=2707&amp;amp;user=test&amp;amp;pwd=test&amp;amp;db=test&amp;amp;continue=false&lt;br /&gt;
The affected parameters are: &amp;quot;config&amp;quot;, &amp;quot;version&amp;quot;, &amp;quot;win&amp;quot;,&amp;quot;db&amp;quot;, &amp;quot;pwd&amp;quot;, and&lt;br /&gt;
&amp;quot;user&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
No valid parameters need to be supplied to trigger the XSS vulnerability as&lt;br /&gt;
seen in following URL:&lt;br /&gt;
/rewe/prod/web/index.php?abc'-alert(%22document.domain%22)-'abc=1&lt;br /&gt;
&lt;br /&gt;
The following URL is affected as well:&lt;br /&gt;
/rewe/prod/web/rewe_go_check.php?config=rewe&amp;amp;version=7.5.0%3cscript%3ealert(1)%3c%2fscript%3e&amp;amp;win=2707&lt;br /&gt;
All parameters are affected.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Vulnerable / tested versions:&lt;br /&gt;
-----------------------------&lt;br /&gt;
The following product/firmware version has been tested:&lt;br /&gt;
* SIS-REWE GO 7.5.0/12C&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Vendor contact timeline:&lt;br /&gt;
------------------------&lt;br /&gt;
2021-02-24: Contacting vendor throughoffice@sisworld.com; no reply.&lt;br /&gt;
2021-03-11: Contacting vendor again throughoffice@sisworld.com.&lt;br /&gt;
2021-03-15: Vendor requests more information. SEC Consult offered to provide.&lt;br /&gt;
             advisory via encrypted or unencrypted mail.&lt;br /&gt;
2021-03-17: Sending advisory via PGP encrypted mail.&lt;br /&gt;
2021-03-21: Vendor confirmed the vulnerability and is working on a patch.&lt;br /&gt;
2021-04-12: Requested status update.&lt;br /&gt;
2021-04-16: Hot fix 7.7 SP16 available in week 16, next release 7.7 SP17 in&lt;br /&gt;
             week 18.&lt;br /&gt;
2021-05-11: Coordinated release of security advisory.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Solution:&lt;br /&gt;
---------&lt;br /&gt;
Contact the vendor in order to install the security patch for release 7.7&lt;br /&gt;
SP16&lt;br /&gt;
or upgrade to release 7.7 SP17. More information has been provided to customers&lt;br /&gt;
of the vendor in a newsletter.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Workaround:&lt;br /&gt;
-----------&lt;br /&gt;
None&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Advisory URL:&lt;br /&gt;
-------------&lt;br /&gt;
https://sec-consult.com/vulnerability-lab/&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~&lt;br /&gt;
&lt;br /&gt;
SEC Consult Vulnerability Lab&lt;br /&gt;
&lt;br /&gt;
SEC Consult, an Atos company&lt;br /&gt;
Europe | Asia | North America&lt;br /&gt;
&lt;br /&gt;
About SEC Consult Vulnerability Lab&lt;br /&gt;
The SEC Consult Vulnerability Lab is an integrated part of SEC Consult, an&lt;br /&gt;
Atos company. It ensures the continued knowledge gain of SEC Consult in the&lt;br /&gt;
field of network and application security to stay ahead of the attacker. The&lt;br /&gt;
SEC Consult Vulnerability Lab supports high-quality penetration testing and&lt;br /&gt;
the evaluation of new offensive and defensive technologies for our customers.&lt;br /&gt;
Hence our customers obtain the most current information about vulnerabilities&lt;br /&gt;
and valid recommendation about the risk profile of new technologies.&lt;br /&gt;
&lt;br /&gt;
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~&lt;br /&gt;
Interested to work with the experts of SEC Consult?&lt;br /&gt;
Send us your applicationhttps://sec-consult.com/career/&lt;br /&gt;
&lt;br /&gt;
Interested in improving your cyber security with the experts of SEC Consult?&lt;br /&gt;
Contact our local officeshttps://sec-consult.com/contact/&lt;br /&gt;
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~&lt;br /&gt;
&lt;br /&gt;
Mail: research at sec-consult dot com&lt;br /&gt;
Web:https://www.sec-consult.com&lt;br /&gt;
Blog:http://blog.sec-consult.com&lt;br /&gt;
Twitter:https://twitter.com/sec_consult&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
EOF Steffen Robertz, Florian Lienhart / @2021&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;/div&gt;</summary>
		<author><name>Pwnwiki</name></author>
	</entry>
</feed>