PeTeReport 0.5 - Stored XSS (Markdown)
Summary
Name | PeTeReport 0.5 - Stored XSS (Markdown) |
Code name | |
Product | PeTeReport |
Affected versions | Version 0.5 |
Fixed Versions | Version 0.7 |
State | Public |
Release date | 2022-02-23 |
Vulnerability
Kind | Stored cross-site scripting (XSS) |
Rule | |
Remote | Yes |
CVSSv3.1 Vector | CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N |
CVSSv3.1 Base Score | 4.8 |
Exploit available | No |
CVE ID(s) |
Description
PeteReport Version 0.5 allows an authenticated admin user to inject persistent javascript code inside the markdown descriptions while creating a product, report or finding.
Proof of Concept
Steps to reproduce
-
Click on 'Add Product'.
-
Insert the following PoC inside the product description.
[XSS](javascript:alert(1))
-
Click on 'Save Product'.
-
If a user visits the product and click on the link in the description the javascript code will be rendered.
System Information
- Version: PeteReport Version 0.5.
- Operating System: Docker.
- Web Server: nginx.
Exploit
There is no exploit for the vulnerability but can be manually exploited.
Mitigation
An updated version of PeteReport is available at the vendor page.
Credits
The vulnerability was discovered by Oscar Uribe from the Offensive Team of Fluid Attacks.
References
Vendor page https://github.com/1modm/petereport
Issue https://github.com/1modm/petereport/issues/35
Timeline
2022-02-08
Vulnerability discovered.
2022-02-08
Vendor contacted.
2022-02-09
Vendor replied acknowledging the report.
2022-02-28
Vulnerability patched.
2022-02-23
Public Disclosure.