Cross-site Scripting (XSS) - Reflected in leantime/leantime

Valid

Reported on

Jul 7th 2021


✍️ Description

Reflected XSS in editBoxDialog.tpl.php where "module" and "label" parameters leads to exploitation of a vulnerability.

🕵️‍♂️ Proof of Concept

Open this link

http://127.0.0.1/setting/editBoxLabel?module=idealabels%22%3E%3Cscript%3Ealert(%22XSS%20by%20OverJT%22)%3C/script%3E&label=jjj

💥 Impact

Possible to steal admin cookies or take over another account via cookie grepping.

💥References

https://owasp.org/www-community/attacks/xss/
https://en.wikipedia.org/wiki/Cross-site_scripting
https://www.acunetix.com/websitesecurity/cross-site-scripting/
https://www.imperva.com/learn/application-security/cross-site-scripting-xss-attacks/

We have contacted a member of the leantime team and are waiting to hear back 4 months ago
leantime/leantime maintainer validated this vulnerability 4 months ago
Jonathan Toledo has been awarded the disclosure bounty
The fix bounty is now up for grabs
Marcel Folaron confirmed that a fix has been merged on 7cbdbf 3 months ago
Marcel Folaron has been awarded the fix bounty