Reflected XSS in type url parameter in leantime/leantime
Reported on
Jun 28th 2022
Description
The application has a reflected xss vulnerability in the url parameter type
.
Proof of Concept
// PoC.js
var payload = "><script>alert(document.cookie)</script>
Impact
If an attacker can control a script that is executed in the victim's browser, then they can typically fully compromise that user. Amongst other things, the attacker can: Perform any action within the application that the user can perform.
I have video PoC if necessary. I submitted this vulnerability via email about a week ago as well.