stored xss in limesurvey/limesurvey
Valid
Reported on
Feb 16th 2023
Description
stored xss bug
SUMMURY
here i uses demo installation https://demo.limesurvey.org/ in firefox browser
Proof of Concept
login into any user account who has permission to view the survey and visit url https://demo.limesurvey.org/index.php?r=questionAdministration/edit&questionId=1389&landOnSideMenuTab=structure&tabOverviewEditor=xss%22%27%3E%3Cimg+src=x+onerror=alert()%3E and see xss is exeuted
here in this url you need to change questionId
parameter value to any valid question id
Plz let me know if need more info . Due to lack of time i submitted this small report
Impact
using this xss attacker can execute any javascript code in victim account
We are processing your report and will contact the
limesurvey
team within 24 hours.
a month ago
We have contacted a member of the
limesurvey
team and are waiting to hear back
a month ago
The researcher has received a minor penalty to their credibility for miscalculating the severity: -1
The researcher's credibility has increased: +7
Carsten Schmitz
has been awarded the fix bounty
This vulnerability will not receive a CVE
This vulnerability is scheduled to go public on
Feb 20th 2023
create.php#L34-L172
has been validated
questionEditor.js#L1950-L2121
has been validated
Thank you!
The researcher's credibility has slightly increased as a result of the maintainer's thanks: +1
to join this conversation