Cross-site Scripting (XSS) - Stored in francoisjacquet/rosariosis
Reported on
Nov 27th 2021
Description
I found XSS in the file upload function of the message function.
Proof of Concept
Step
1.First, access the latest version of the demo environment. "Https://www.rosariosis.org/demonstration/index.php"
2.Then log in with your student account. Student: username and password “student“
3.After logging in, access "MESSAGING > Write" from the menu on the left. (/demonstration/Modules.php?modname=Messaging/Write.php
)
4.Then enter the title and message as appropriate.
5.Now upload the SVG file containing XSS to "File Attached".
6.Finally, select "Teach Teacher" as the destination and send.
7.Log in from here with your teacher's account. Teacher: username and password “teacher“
8.After logging in, access "MESSAGING > Messages" from the menu and select the message you just sent.
9.Then click on the last attached file and a pop-up screen will appear.
Summary
-Endpoint: POST /demonstration/Modules.php?modname=Messaging/Write.php&search_modfunc=list&recipients_key=staff_id&subject=<title>&message=<message>&recipients_ids[0]=2&send=Send
-Attachment: SVG file
-Test Payload: <script type="text/javascript">alert(document.cookie)</script>
Impact
This vulnerability can steal a user's cookie.
Hello @scgajge12
Thank you very much for your report. SVG upload has been disabled for now. I may introduce SVG sanitize routine in the future.
@maintainer , I would be glad if you could approve for CVE.
Same here, I would recommend dropping a comment on the commit SHA as we require the maintainer(s) go ahead to publish a CVE 👍
Thanks to François Jacquet for the approval.
@admin , I got approval from the maintainer.
The CVE has been assigned and will be published automatically in the next couple of hours 👍