Cross-site Scripting via link creation bypass filter javascript scheme in outline/outline
Reported on
Jul 21st 2022
Description
The markdown's link creation
feature allows inserting paths containing javascript scheme bypass filter javascript
scheme via add https
scheme prefix, so this flaw lead to XSS vulnerability.
The payload used is the following:
Proof of Concept
Step to reproduct
1.
Create new document
2.
Add link as [xss](javascript:alert``))
PoC Video
https://drive.google.com/file/d/1qlcih2JP_N57KGhfDqbP0E-MmoRTSHlq/view?usp=sharing
Note: If the image quality is low when viewing live, you can download and watch
Impact
An attacker could use this vulnerability to takeover an admin account and get access to all the features of the outline application.
References
Hi @maintainer, can you assign CVE id for this vulnerability? if possible hope @admin will help!
Happy to assign a CVE if the maintainer is happy to proceed with one 👍