Skip to content

Stored XSS on Goal Section

Low
marcelfolaron published GHSA-q5f6-2jfc-pmf7 Nov 16, 2024

Package

No package listed

Affected versions

<2.3.20

Patched versions

2.3.21

Description

Summary

Improper Neutralization of Input During Web Page Generation ('Stored Cross-site Scripting')

Details

VULNERABILITY: STORED XSS
PAYLOADS USED:

<iframe %00 src=" javascript:prompt(1) "%00> <iframe src=javascript:alert(document.location)> <iframe %00 src=" javascript:prompt(1) "%00>

Affected url:
https://www.{username}.leantime.io/goalcanvas/showCanvas

PoC

STEPS TO REPRODUCE THE BUG:

  1. VISIT: https://www.{username}.leantime.io/dashboard/
  2. Visit the goals tab from your dashboard.
  3. Create new goal.
  4. Now paste the payload under title and How will you measure success? Which metric will you be using? fields respectively.
  5. Now save and close , you can see the payload executing
  6. Now go to the discussion section of your goal which you created now.
  7. Paste any one of the payload and save.
  8. Now each time you visit the goals tab you can see the payload executing.

Impact

n terms of exploitability, the key difference between reflected and stored XSS is that a stored XSS vulnerability enables attacks that are self-contained within the application itself. The attacker does not need to find an external way of inducing other users to make a particular request containing their exploit. Rather, the attacker places their exploit into the application itself and simply waits for users to encounter it.

The self-contained nature of stored cross-site scripting exploits is particularly relevant in situations where an XSS vulnerability only affects users who are currently logged in to the application. If the XSS is reflected, then the attack must be fortuitously timed: a user who is induced to make the attacker's request at a time when they are not logged in will not be compromised. In contrast, if the XSS is stored, then the user is guaranteed to be logged in at the time they encounter the exploit.

I have attached Video Proof of concept . Thank you

POC-LINK: https://sendspark.com/share/6awthphyzm53hyiu

Severity

Low

CVE ID

No known CVE

Weaknesses

Credits