Stored XSS in Project Name in kromitgmbh/titra

Valid

Reported on

Jun 4th 2022


Description

The application Titra is vulnerable to Stored XSS in Project name field.

Steps To Reproduce

  1. Click on Edit button
  2. Under the Project Name enter the paylaod "><img src=# onerror=alert(document.domain)>
  3. Click on save.
  4. Now navigate to details the XSS will be triggered.

Image PoC

https://drive.google.com/file/d/1P44bIq0VgqMMUdb7VEKhF1Q_7PdY2k4Z/view?usp=sharing https://drive.google.com/file/d/1sEJnrY8wxPY9gw1yPL1M4NH7Xe0qkgMT/view?usp=sharing

Impact

This allows the attacker to execute malicious scripts in all the project members browser and it can lead to session hijacking, sensitive data exposure, and worse.

We are processing your report and will contact the kromitgmbh/titra team within 24 hours. 22 days ago
saharshtapi
22 days ago

Researcher


@admin please change the vulnerability type from Generic XSS to Stored XSS

We have contacted a member of the kromitgmbh/titra team and are waiting to hear back 20 days ago
Jamie Slome
20 days ago

Admin


@saharshtapi - you should be able to change the vulnerability type to Stored XSS using the Edit button at the top right-hand side of the page.

If you are unable to, this is because you already have a Stored XSS report pending against this repository, and so should add the other occurrences of the same vulnerability type to that report using the permalinks.

kromitgmbh/titra maintainer validated this vulnerability 18 days ago
saharshtapi has been awarded the disclosure bounty
The fix bounty is now up for grabs
The researcher's credibility has increased: +7
kromitgmbh/titra maintainer confirmed that a fix has been merged on e606b6 18 days ago
The fix bounty has been dropped
kromitgmbh/titra maintainer gave praise 18 days ago
thanks for reporting this!
The researcher's credibility has slightly increased as a result of the maintainer's thanks: +1
saharshtapi
18 days ago

Researcher


@admin Can you assign CVE?

Jamie Slome
18 days ago

Admin


Sorted 👍

to join this conversation