Stored XSS on drawio in jgraph/drawio
Valid
Reported on
May 15th 2022
Sumary
Draw io has a feature to put links on a text, due to a bad sanitization it allows to put javascript:// scheme on a anchor tag which allows to execute javascript code
Steps to reproduce
- Create a text box and set word size to 50
- Click with the rigth button and "Edit link"
- Put asdf://test.com
- Click with the rigth button again and "Edit data"
- On the "link" attribute put javascript:javascript://%0aalert(document.domain)
- Export the page as URL
- Click on the link
Impact
It also affects confluence as its available as an app on the marketplace, POC video: https://youtu.be/RHevZOx1nhc
References
We are processing your report and will contact the
jgraph/drawio
team within 24 hours.
a year ago
The researcher's credibility has increased: +7
Thank you for correctly scoring the fix initially. There's many attempts to simply score everything as critical, we do remember when researchers score professionally.
The researcher's credibility has slightly increased as a result of the maintainer's thanks: +1
The fix bounty has been dropped
This vulnerability will not receive a CVE
to join this conversation