Stored XSS in "Tab Image" and "Group Image" in causefx/organizr
Reported on
May 24th 2022
Description
The organizr application allows malicious javascript payload in the "Tab Image" and "Group Image" for which its leads to stored XSS.
Proof of Concept 1
1.Login to the co-admin account and go to "Settings" -> "Tab Editor".
2.Now click on "Tabs" -> "Add New Tab" and filled all the details.
3.Then in "Tab Image" insert the payload "><img src=x onerror=alert(document.cookie)>
and click on Add Tab
Proof of Concept 2
1.Login to the co-admin account and go to "Settings" -> "User Management" -> "Manage Groups".
2.Now click on "Add New Group" and filled all the details.
3.Then in "Group Image" insert the payload "><img src=x onerror=alert(document.location)>
and click on Add Group
Video PoC
https://drive.google.com/file/d/1P6-Zq5D55EegVjfeLNtwG-7bU0_6mexn/view?usp=sharing
Impact
This allows attackers to execute malicious scripts in the user's browser and it can lead to session hijacking, sensitive data exposure, and worse.
@admin as the fix has been deployed can you assign CVE for this report?