CVE-2023-6275: CWE-79 Cross Site Scripting in TOTVS Fluig Platform
A vulnerability was found in TOTVS Fluig Platform 1.6.x/1.7.x/1.8.0/1.8.1. It has been rated as problematic. Affected by this issue is some unknown functionality of the file /mobileredir/openApp.jsp of the component mobileredir. The manipulation of the argument redirectUrl/user with the input "><script>alert(document.domain)</script> leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 1.7.1-231128, 1.8.0-231127 and 1.8.1-231127 is able to address this issue. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-246104.
AI Analysis
Technical Summary
CVE-2023-6275 is a Cross Site Scripting (XSS) vulnerability identified in the TOTVS Fluig Platform versions 1.6.x, 1.7.x, 1.8.0, and 1.8.1. The vulnerability resides in the mobileredir component, specifically in the /mobileredir/openApp.jsp file. The issue arises from improper sanitization of the redirectUrl/user parameter, which allows an attacker to inject malicious JavaScript code, such as "><script>alert(document.domain)</script>. This type of injection enables an attacker to execute arbitrary scripts in the context of the victim's browser session when they visit a crafted URL. The vulnerability can be exploited remotely, but requires some level of privileges (PR:L) and user interaction (UI:R), as indicated by the CVSS vector. The flaw does not impact confidentiality but can affect the integrity of the user's session or data by executing unauthorized scripts, potentially leading to session hijacking, phishing, or other client-side attacks. The vendor has addressed this issue in versions 1.7.1-231128, 1.8.0-231127, and 1.8.1-231127, and upgrading to these versions is recommended to remediate the vulnerability. Although the CVSS score is 3.5 (low severity), the public disclosure of the exploit code increases the risk of opportunistic attacks, especially in environments where the platform is widely used and users may be less security-aware.
Potential Impact
For European organizations using TOTVS Fluig Platform, this XSS vulnerability can lead to client-side attacks that compromise user sessions and trust in the platform. While it does not directly compromise server confidentiality or availability, successful exploitation can enable attackers to steal session cookies, perform actions on behalf of users, or redirect users to malicious sites. This can result in data integrity issues, loss of user trust, and potential compliance violations under GDPR if personal data is exposed or manipulated. Organizations in sectors such as finance, healthcare, and public administration that rely on Fluig for collaboration and document management may face reputational damage and operational disruptions. The requirement for user interaction and some privileges reduces the likelihood of widespread automated exploitation but does not eliminate targeted attacks, especially spear-phishing campaigns leveraging this vulnerability.
Mitigation Recommendations
1. Immediate upgrade of TOTVS Fluig Platform to the fixed versions 1.7.1-231128, 1.8.0-231127, or 1.8.1-231127 to ensure the vulnerability is patched. 2. Implement strict Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in browsers accessing the platform. 3. Conduct a thorough review of all user input handling and output encoding in customizations or integrations with Fluig to prevent similar injection flaws. 4. Educate users about the risks of clicking on suspicious links and implement multi-factor authentication to reduce the impact of session hijacking. 5. Monitor web application logs and user activity for unusual patterns that may indicate exploitation attempts. 6. If upgrading is not immediately possible, consider deploying Web Application Firewall (WAF) rules to detect and block malicious payloads targeting the redirectUrl/user parameter.
Affected Countries
Portugal, Spain, Italy, Germany, France, United Kingdom, Netherlands, Belgium
CVE-2023-6275: CWE-79 Cross Site Scripting in TOTVS Fluig Platform
Description
A vulnerability was found in TOTVS Fluig Platform 1.6.x/1.7.x/1.8.0/1.8.1. It has been rated as problematic. Affected by this issue is some unknown functionality of the file /mobileredir/openApp.jsp of the component mobileredir. The manipulation of the argument redirectUrl/user with the input "><script>alert(document.domain)</script> leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 1.7.1-231128, 1.8.0-231127 and 1.8.1-231127 is able to address this issue. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-246104.
AI-Powered Analysis
Technical Analysis
CVE-2023-6275 is a Cross Site Scripting (XSS) vulnerability identified in the TOTVS Fluig Platform versions 1.6.x, 1.7.x, 1.8.0, and 1.8.1. The vulnerability resides in the mobileredir component, specifically in the /mobileredir/openApp.jsp file. The issue arises from improper sanitization of the redirectUrl/user parameter, which allows an attacker to inject malicious JavaScript code, such as "><script>alert(document.domain)</script>. This type of injection enables an attacker to execute arbitrary scripts in the context of the victim's browser session when they visit a crafted URL. The vulnerability can be exploited remotely, but requires some level of privileges (PR:L) and user interaction (UI:R), as indicated by the CVSS vector. The flaw does not impact confidentiality but can affect the integrity of the user's session or data by executing unauthorized scripts, potentially leading to session hijacking, phishing, or other client-side attacks. The vendor has addressed this issue in versions 1.7.1-231128, 1.8.0-231127, and 1.8.1-231127, and upgrading to these versions is recommended to remediate the vulnerability. Although the CVSS score is 3.5 (low severity), the public disclosure of the exploit code increases the risk of opportunistic attacks, especially in environments where the platform is widely used and users may be less security-aware.
Potential Impact
For European organizations using TOTVS Fluig Platform, this XSS vulnerability can lead to client-side attacks that compromise user sessions and trust in the platform. While it does not directly compromise server confidentiality or availability, successful exploitation can enable attackers to steal session cookies, perform actions on behalf of users, or redirect users to malicious sites. This can result in data integrity issues, loss of user trust, and potential compliance violations under GDPR if personal data is exposed or manipulated. Organizations in sectors such as finance, healthcare, and public administration that rely on Fluig for collaboration and document management may face reputational damage and operational disruptions. The requirement for user interaction and some privileges reduces the likelihood of widespread automated exploitation but does not eliminate targeted attacks, especially spear-phishing campaigns leveraging this vulnerability.
Mitigation Recommendations
1. Immediate upgrade of TOTVS Fluig Platform to the fixed versions 1.7.1-231128, 1.8.0-231127, or 1.8.1-231127 to ensure the vulnerability is patched. 2. Implement strict Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in browsers accessing the platform. 3. Conduct a thorough review of all user input handling and output encoding in customizations or integrations with Fluig to prevent similar injection flaws. 4. Educate users about the risks of clicking on suspicious links and implement multi-factor authentication to reduce the impact of session hijacking. 5. Monitor web application logs and user activity for unusual patterns that may indicate exploitation attempts. 6. If upgrading is not immediately possible, consider deploying Web Application Firewall (WAF) rules to detect and block malicious payloads targeting the redirectUrl/user parameter.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2023-11-24T07:39:50.362Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 683f034a182aa0cae27e662e
Added to database: 6/3/2025, 2:14:34 PM
Last enriched: 7/4/2025, 4:25:47 PM
Last updated: 10/14/2025, 11:39:32 PM
Views: 27
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-54196: URL Redirection to Untrusted Site ('Open Redirect') (CWE-601) in Adobe Adobe Connect
LowCVE-2025-49553: Cross-site Scripting (DOM-based XSS) (CWE-79) in Adobe Adobe Connect
CriticalCVE-2025-49552: Cross-site Scripting (DOM-based XSS) (CWE-79) in Adobe Adobe Connect
HighCVE-2025-62376: CWE-287: Improper Authentication in pwncollege dojo
CriticalCVE-2025-61797: Cross-site Scripting (Stored XSS) (CWE-79) in Adobe Adobe Experience Manager
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.