Skip to content

Stored XSS Vulnerability in Calender

Moderate
marcelfolaron published GHSA-749v-fh5c-wp42 Nov 16, 2024

Package

No package listed

Affected versions

V2.4.8

Patched versions

3.0.0

Description

Summary

Hello Team,
I have found stored xss at https://*.leantime.io/calendar/showMyCalendar. XSS will be triggered to those who is having access to the calendar.

Details

Stored XSS: Stored XSS, also known as persistent XSS, is the more damaging of the two. It occurs when a malicious script is injected directly into a vulnerable web application

Steps to Reproduce:

  1. Login to https://*.leantime.io portal
  2. Click on My Calendar and then click on Add Event
  3. In the Title field, enter the XSS payload "<script>alert(1)</script>".
  4. Enter the rest of details in the event and click on save.
  5. The XSS payload will get triggered and you'll get the pop up.

Impact

An attacker can perform multiple things using stored XSS.

  1. Website Defacement via XSS
  2. Malware Download via XSS
  3. Open Redirection via XSS
  4. Cookie Stealing - A malicious user can steal cookies and use them to gain access to the application.

###POC
image

Severity

Moderate

CVE ID

No known CVE

Weaknesses

Credits