Cross site Scripting By injecting iframe in inventree/inventree
Reported on
Jun 15th 2022
Description
Cross site scripting using iframe
Proof of Concept
1.Goto https://demo.inventree.org/company/manufacturers/ 2.Create new Manufracturer 3.In Add notes Section add this payload <iframe src="https://brutelogic.com.br/poc.svg"></iframe> and save 4.Visit this address https://demo.inventree.org/company/ID
POC :- Visit this url https://demo.inventree.org/company/39/
Impact
Cross site scripting
I can reproduce this report on the latest release. We will start work on a fix now. Thank you @gaurav-g2 we will release the bounty now and attribute you in the advisory.
A fix is written up now - once the CI is run through we should be able to release a patch in a few hours.
Hi @matmair thanks for validating this report but since you have lower the severity to medium bounty amount went to zero because huntr only pay for high and critical severity issue. I found that some issues with same vulnerability consider as high and critical can you please try to reconsider severity of this report
Thanks
@gaurav-g2 this is the score it gets if I fill out the questionnaire for the severity. I think the main contributing factor for the high score was that you selected that no rights were needed for executing it but actually you need to be authenticated and also that it impacts the availability - which it does not as the note field is never processed in any form other than as a string. I am not shure if you can see all the selected fields and how the score calculates but that is what I changed.