Stored XSS in Task field in kromitgmbh/titra
Reported on
Jun 4th 2022
Description
The application Titra
is vulnerable to Stored XSS in Task field.
Steps To Reproduce
- Click on add Track button
- In the Task field enter the payload
"><img src=# onerror=alert(document.domain)>
- click save
- Now Click on Details
- XSS will be triggered
Image PoC
https://drive.google.com/file/d/1twcYvvdV-hCE4hI0HwtnE9ZvqpYC77gS/view?usp=sharing https://drive.google.com/file/d/1CNtiY-VeLjPtYQOx3clUKSxgSAMM2mQM/view?usp=sharing
Impact
This allows the attacker to execute malicious scripts in all the project members browser and it can lead to session hijacking, sensitive data exposure, and worse.
@admin please change the vulnerability type from DOM XSS to Stored XSS
@saharshtapi - you should be able to change the vulnerability type to Stored XSS using the Edit
button at the top right-hand side of the page.
If you are unable to, this is because you already have a Stored XSS report pending against this repository, and so should add the other occurrences of the same vulnerability type to that report using the permalinks.