Cross-Site Scripting (Stored/Persistent) in Categories in uvdesk/community-skeleton

Valid

Reported on

Feb 23rd 2023


Description

• The application is vulnerable to Cross-Site Scripting (XSS) attacks. This occurs when web applications do not properly validate user-supplied inputs before including them in dynamic web pages.

• By intercepting the HTTP Request using Burp-suite tool before submitting into the webpage, Jeffrey was able to store special characters and code in the application, which may then be executed by other users.

Payload

<a onmouseover="alert(document.cookie)">xxs link</a>

POC Walkthrough Video Link:

https://drive.google.com/file/d/1Pc9vQTf5v0FyzrlPPfu9v2Grc1vkS64U/view?usp=share_link

Recommendation

• Before using any user-supplied data, validate its format and reject any characters that are not explicitly allowed (i.e. a white-list). This list should be as restrictive as possible.

• Before using any data (stored or user-supplied) to generate web page content, escape all non alpha-numeric characters (i.e. output-validation). This is particularly important when the original source of data is beyond the control of the application. Even if the source of the data isn't performing input-validation, output-validation will still prevent XSS. This can be done by converting characters to “&#nn;” (ignore the quotes), where “nn” is the hexadecimal ASCII character number.

• You can also limit the size of the category name when creating.

Impact

• Cross-Site Scripting (XSS) Stored can cause a variety of problems for the end user that range in severity from an annoyance to complete account compromise. `

• The most severe XSS attacks involve disclosure of the user's session cookie, allowing an attacker to hijack the user's session and take over the account.

We are processing your report and will contact the uvdesk/community-skeleton team within 24 hours. a month ago
Jeffrey G modified the report
a month ago
We have contacted a member of the uvdesk/community-skeleton team and are waiting to hear back a month ago
Jeffrey G
a month ago

Researcher


Hi Maintainer, a gentle follow-up on this, please?

Thank you.

Regards, Jeffrey

Jeffrey G
a month ago

Researcher


Hi Maintainer,

Any update on this, please?

Thank you.

Jeffrey

Jeffrey G
a month ago

Researcher


Hi Maintainer, a gentle reminder on this.

Cheers!

Jeffrey

Jeffrey G
a month ago

Researcher


Hi @Maintainer,

I can confirm that the remediation applied in the uvdesk demo page has been fixed already.

Kindly help to tag the submitted vulnerability as valid and if it's okay to assign cve as well.

Thank you.

Best Regards, Jeffrey

Akshay Kumar validated this vulnerability 25 days ago
Jeffrey G has been awarded the disclosure bounty
The fix bounty is now up for grabs
The researcher's credibility has increased: +7
Jeffrey G
25 days ago

Researcher


Hi Akshay,

Thank you so much bro for validating my report.

Do you mind to assign a CVE, please?

Cheers.

Jeffrey

Akshay Kumar marked this as fixed in 1.1.0 with commit 6fae94 25 days ago
The fix bounty has been dropped
This vulnerability has been assigned a CVE
Akshay Kumar published this vulnerability 25 days ago
Jeffrey G
25 days ago

Researcher


Hello Akshay,

Thank you so for assigning a CVE for the reported vulnerability, appreciate it.

Cheers!

Jeffrey

to join this conversation