Cross-site Scripting (XSS) - Stored in leantime/leantime
Valid
Reported on
Sep 2nd 2021
✍️ Description
A malicious actor is able to add new Milestone
with a malicious payload, and upon opening the research menu, the XSS payload is being executed.
🕵️♂️ Proof of Concept
- 1; Log in with a proper roled user
- 2; Add a new Milestone to the system at the
/tickets/roadmap
URI with the+ New Milestone
button - 3; Insert the following payload in the name field:
<script>alert(document.cookie)</script>
- 4; Click on
Milestones
menu item on the left side of the site, and the xss payload is being executed
💥 Impact
With such opprotunity, the malicious actor is able to gather session identifiers from any users. Upon receiving this information, the Confidentiality, Integrity is compromised of the target's account.
We have contacted a member of the
leantime
team and are waiting to hear back
2 years ago
to join this conversation