XSS in Markdown Events in alfio-event/alf.io
Reported on
Dec 7th 2022
Description
XSS Vulnerability in the Events and Markdown features
Proof of Concept
Login to the dashboard
Insert or Edit Events in the Description and Link
Payload like that
[Link](javascript:alert(1))
[Link](data:text/html,s<script>alert(1) </script>)
POC:
https://drive.google.com/file/d/1WiNd8lgEjmSpUe4b0LCoKyFw47nsw45s/view?usp=sharing
https://drive.google.com/file/d/1s01gohZ3wQczDdYaC-sNNZ6g0WtOxwSK/view?usp=sharing
https://drive.google.com/file/d/1PCkUhsUI8JTJXMhTwHfSAgoYwIw2y86t/view?usp=sharing
Impact
Run Javascript Code on User Browser
hi @reza.duty , I mark this issue as Valid. It should be noted it must be done by the admin/event creator itself and it should preview the data and click the link, which is quite a contrived scenario, but anyway, good catch! We appreciate it.
We already did a fix by filtering out any non http / https protocols, which should handle this specific case.
Thank you.