Store DOM XSS when create survey in limesurvey/limesurvey

Valid

Reported on

Sep 3rd 2023


Description

I noticed, your website is very secure.

But you overlooked a flaw Store DOM XSS .

Proof of Concept

Detail:

1 .Login vs admin demo account

2 .Create new survey , insert payload in to Survey title:

  test" onclick = "alert(document.domain)"

3 . Click create ==> detect Store DOM XSS

Video Poc

https://drive.google.com/file/d/14SVKtT1L6xAWvOma99kgdTImas2DF8RE/view?usp=sharing

Impact

This security vulnerability has the potential to steal multiple users' cookies, gain unauthorized access to that user's account through stolen cookies, or redirect the user to other malicious websites...

We are processing your report and will contact the limesurvey team within 24 hours. 3 months ago
HaiNguyen modified the report
3 months ago
HaiNguyen modified the report
3 months ago
HaiNguyen modified the report
3 months ago
HaiNguyen modified the report
3 months ago
We have contacted a member of the limesurvey team and are waiting to hear back 3 months ago
HaiNguyen modified the report
3 months ago
tiborpacalat
3 months ago

Maintainer


Internal tracking number: 19100

Denis Chenu modified the Severity from High (7.4) to Medium (6.6) 3 months ago
Denis Chenu
3 months ago

Maintainer


Need to be superadmin or XSS disable see https://manual.limesurvey.org/Global_settings#Security Filter HTML for XSS

Move Privileged to High

The researcher has received a minor penalty to their credibility for miscalculating the severity: -1
tiborpacalat validated this vulnerability 2 months ago
HaiNguyen has been awarded the disclosure bounty
The fix bounty is now up for grabs
The researcher's credibility has increased: +7
tiborpacalat marked this as fixed in 6.2.9+230925 with commit c5469d 2 months ago
The fix bounty has been dropped
This vulnerability will not receive a CVE
tiborpacalat published this vulnerability 2 months ago
to join this conversation