Teedy v1.11 - Stored cross-site scripting (XSS)

Summary

NameTeedy v1.11 - Stored cross-site scripting (XSS)
Code name
ProductTeedy
Affected versionsVersion 1.11
Fixed Versions
StatePublic
Release date2023-09-25

Vulnerability

KindStored cross-site scripting (XSS)
Rule
RemoteYes
CVSSv3.1 VectorCVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N
CVSSv3.1 Base Score5.7
Exploit availableYes
CVE ID(s)

Description

Teedy v1.11 has a vulnerability in its text editor that allows events to be executed in HTML tags that an attacker could manipulate. Thanks to this, it is possible to execute malicious JavaScript in the webapp.

Vulnerability

A Stored cross-site scripting (XSS) vulnerability was identified in Teedy v1.11, which can allow an attacker to steal data such as session cookies or even steal private documents from other users. This vulnerability can be exploited in case a user wants to modify the malicious document created by the attacker.

Exploitation

To exploit this vulnerability go to Home -> Add a document -> Edit -> Save -> Edit the created document (this is where the XSS is executed).

teedy-010

It should be clarified that the attacker needs access to the platform in order to exploit this vulnerability. This would be an example of a functional payload:

<img src=x onerror=alert(document.cookie)>

This payload only retrieves the user's cookie and displays it on the screen, but an attacker could send it to a remote server to steal another user's session.

Our security policy

We have reserved the ID CVE-2023-4892 to refer to this issue from now on.

System Information

  • Version: Teedy v1.11 (2023-03-12)

  • Operating System: MacOS

Mitigation

An updated version of Teedy is available at the vendor page.

Credits

The vulnerability was discovered by Renzo Machado from Fluid Attacks' Offensive Team.

References

Vendor page https://teedy.io

Timeline

Time-lapse-logo

2023-09-11

Vulnerability discovered.

Time-lapse-logo

2023-09-12

Vendor contacted.

Time-lapse-logo

2023-09-25

Public Disclosure.

Fluid Logo Footer

Hacking software for over 20 years

Fluid Attacks tests applications and other systems, covering all software development stages. Our team assists clients in quickly identifying and managing vulnerabilities to reduce the risk of incidents and deploy secure technology.

Copyright © 0 Fluid Attacks. We hack your software. All rights reserved.