Cross-site Scripting (XSS) - Stored in leantime/leantime
Valid
Reported on
Aug 17th 2021
✍️ Description
Stored xss bug using a xss payload in the Ideas area when adding a comment in the discussion area
🕵️♂️ Proof of Concept
Goto http://localhost/ideas/showBoards and click on add an idea and copy paste the following xss payload in the discussion field
"><img src=x onerror=alert(document.cookie)>
Click on safe and see the xss popup with the cookie.
💥 Impact
Possible to steal admin cookies or take over another account via cookie grepping.
💥 Remediation
Validate user input
💥References
https://owasp.org/www-community/attacks/xss/
https://en.wikipedia.org/wiki/Cross-site_scripting
https://www.acunetix.com/websitesecurity/cross-site-scripting/
https://www.imperva.com/learn/application-security/cross-site-scripting-xss-attacks/
We have contacted a member of the
leantime
team and are waiting to hear back
2 years ago
to join this conversation