Cross-site Scripting (XSS) - Stored in patrowl/patrowlmanager
Reported on
Dec 8th 2021
Description
PatrOwl is vulnerable to stored XSS in asset group name. The payload will be triggered when someone try to delete the asset group.
Proof of Concept
https://drive.google.com/file/d/1F7m9g7s6xp-L5Q_Ky5ACOvndWAj8g20s/view?usp=sharing
Impact
This vulnerability permit to an authenticate user to execute JavaScript on other users Web Browser.
References
Hi there ! Thank you for the report ! We fix it ASAP
Fix has been released ! Could please have a quick check on changes ? Thanks !
Hi there, I pulled the latest code from master branch and still can see payload executed there.
https://drive.google.com/file/d/1udcYmCKArJk7acwYdO2sOzmhX3fXUhTx/view?usp=sharing
Hi thre, sorry after rebuilding the docker images, the XSS is gone. I confirm that this issue has been fixed.