Stored XSS in Page Title in omeka/omeka-s
Valid
Reported on
Aug 5th 2023
Description
At the latest version, the page title has been escaped and cannot trigger the XSS payload. However, by login to a user with other privileges, I see that It's still not escaped yet.
Proof of Concept
Step 1: Login as Admin, create a page in site1
with the title ">test<img src=x onerror=prompt(1)>
and see that the page title has been escaped and cannot trigger the XSS payload.
Step 2: User1 with the
Author
privilege
Step 3: Login as User1 and go to view the page of
site1
and see that the payload is triggered.
Impact
The attacker can compromise user account
We are processing your report and will contact the
omeka/omeka-s
team within 24 hours.
2 months ago
We have contacted a member of the
omeka/omeka-s
team and are waiting to hear back
2 months ago
The researcher's credibility has increased: +7
The fix bounty has been dropped
This vulnerability has been assigned a CVE
This vulnerability is scheduled to go public on
Aug 28th 2023
to join this conversation