Cross-site Scripting (XSS) - Stored in leantime/leantime

Valid

Reported on

Jul 5th 2021


✍️ Description

Stored xss bug using a xss payload in the Hypothesis when adding a new Research

🕵️‍♂️ Proof of Concept

Goto http://localhost/leancanvas/simpleCanvas and click on add new and copy paste the following xss payload

"><img src=x onerror=alert(document.cookie)>

Click on safe and see the xss popup with the cookie.

💥 Impact

Possible to steal admin cookies or take over another account via cookie grepping.

💥 Remediation

Validate user input

💥References

https://owasp.org/www-community/attacks/xss/

https://en.wikipedia.org/wiki/Cross-site_scripting

https://www.acunetix.com/websitesecurity/cross-site-scripting/

https://www.imperva.com/learn/application-security/cross-site-scripting-xss-attacks/

ribersec
2 years ago

Researcher


@maintainer any thoughts about this?

We have contacted a member of the leantime team and are waiting to hear back 2 years ago
leantime/leantime maintainer validated this vulnerability 2 years ago
ribersec has been awarded the disclosure bounty
The fix bounty is now up for grabs
Marcel Folaron marked this as fixed with commit 7cbdbf 2 years ago
Marcel Folaron has been awarded the fix bounty
This vulnerability will not receive a CVE
to join this conversation