Cross-site Scripting (XSS) - Stored in bookstackapp/bookstack


Reported on

Sep 1st 2021

✍️ Description

There is html tag filtration problem in "book page" egit leading to stored XSS.

By design "bad" tags and attributes stripped on client side when editing page(obvious bypass by editing request intercepted via burp) and on server side addition filter applied, however this filter can be also bypassed.

🕵️‍♂️ Proof of Concept

There is a number of html tags in white list which can be used to obtain stored XSS. As example: by using tag <a> or <iframe> attacker can exec js code by adding href=javascript:<scomecode>, but javascript: will be filtered on server side. Unfortunately it can be bypassed by using camel-case: JavAScRipT:

Request example:

POST /bookstack/public/books/bookname/page/pagename HTTP/1.1
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
Content-Type: application/x-www-form-urlencoded
Content-Length: 494
DNT: 1
Connection: close
Referer: /bookstack/public/books/bookname/page/pagename
Cookie: <COOKIE>
Upgrade-Insecure-Requests: 1


💥 Impact

Stored XSS


Use case insensitive functions to locate potential "bad" html attributes.

We have contacted a member of the bookstackapp/bookstack team and are waiting to hear back 2 years ago
bookstackapp/bookstack maintainer
2 years ago


As per the other issue, Thanks!

bookstackapp/bookstack maintainer validated this vulnerability 2 years ago
wezery has been awarded the disclosure bounty
The fix bounty is now up for grabs
bookstackapp/bookstack maintainer marked this as fixed with commit 5e6092 2 years ago
The fix bounty has been dropped
This vulnerability will not receive a CVE
Jamie Slome
2 years ago


CVE published! 🎉

to join this conversation