Description
Our security team found a security issue inside Popcorn Time 0.4.7. We have reserved the CVE-2022-25229 to refer to this issue. Attached below is the link to our responsible disclosure policy.
https://fluidattacks.com/advisories/policy
Bug description
Popcorn Time 0.4.7 has a Stored XSS in the Movies API Server(s) field via the settings page. The nodeIntegration configuration is set to on which allows the webpage to use NodeJs features, an attacker can leverage this to run OS commands.
CVSSv3 Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N
CVSSv3 Base Score:
7.7
Steps to reproduce
-
Open the Popcorn time application.
-
Go to
settings. -
Enable
Show advanced settings. -
Scroll down to the
API Server(s)section. -
Insert the following PoC inside the
Movies API Server(s)field and click onCheck for updates.
a"><script>require('child_process').exec('calc');</script>-
Scroll down to the
Databasesection and click onExport database. -
The application will create a
.zipfile with the current configuration. -
Send the configuration to the victim.
-
The victim must go to
Settings -> Databaseand click onImport Database -
When the victim restarts the application the XSS will be triggered and will run the
calccommand.
Screenshots and files
System Information
- Version: Popcorn Time 0.4.7.
- Operating System: Windows 10.0.19042 N/A Build 19042.
- Installer: Popcorn-Time-0.4.7-win64-Setup.exe
