Security
Headlines
HeadlinesLatestCVEs

Headline

CVE-2022-25229: Popcorn Time 0.4.7 - XSS to RCE | Fluid Attacks

Popcorn Time 0.4.7 has a Stored XSS in the 'Movies API Server(s)‘’ field via the ‘settings’ page. The ‘nodeIntegration’ configuration is set to on which allows the webpage to use ‘NodeJs’ features, an attacker can leverage this to run OS commands.

CVE
#xss#vulnerability#web#windows#nodejs#js#git#rce
  1. Home
  2. Advisories
  3. Popcorn Time 0.4.7 XSS to RCE

Summary

Name

Popcorn Time 0.4.7 - XSS to RCE

Code name

Bowie

Product

Popcorn Time

Affected versions

Version 0.4.7 (Just Keep Swimming)

State

Public

Release date

2022-05-17

Vulnerability

Kind

XSS to RCE

Rule

010. Stored cross-site scripting (XSS)

Remote

No

CVSSv3 Vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N

CVSSv3 Base Score

7.7

Exploit available

No

CVE ID(s)

CVE-2022-25229

Description

Popcorn Time 0.4.7 has a Stored XSS in the Movies API Server(s) field via the settings page. The nodeIntegration configuration is set to on which allows the webpage to use NodeJs features, an attacker can leverage this to run OS commands.

Proof of Concept****Steps to reproduce

  1. Open the Popcorn time application.

  2. Go to settings.

  3. Enable Show advanced settings.

  4. Scroll down to the API Server(s) section.

  5. Insert the following PoC inside the Movies API Server(s) field and click on Check for updates.

a"><script>require('child_process').exec('calc');</script>
  1. Scroll down to the Database section and click on Export database.

  2. The application will create a .zip file with the current configuration.

  3. Send the configuration to the victim.

  4. The victim must go to Settings -> Database and click on Import Database

  5. When the victim restarts the application the XSS will be triggered and will run the calc command.

System Information

  • Version: Popcorn Time 0.4.7.
  • Operating System: Windows 10.0.19042 N/A Build 19042.
  • Installer: Popcorn-Time-0.4.7-win64-Setup.exe

Exploit

There is no exploit for the vulnerability but can be manually exploited.

Mitigation

An updated version of PopcornTime is available at the vendor page.

Credits

The vulnerability was discovered by Oscar Uribe from the Offensive Team of Fluid Attacks.

References

Vendor page https://github.com/popcorn-official/popcorn-desktop

Issue https://github.com/popcorn-official/popcorn-desktop/issues/2491

Timeline

2022-04-26

Vulnerability discovered.

2022-04-26

Vendor contacted.

2022-05-04

Vendor Confirmed the vulnerability.

2022-05-07

Vulnerability patched.

2022-05-17

Public Disclosure.

CVE: Latest News

CVE-2023-50976: Transactions API Authorization by oleiman · Pull Request #14969 · redpanda-data/redpanda
CVE-2023-6905
CVE-2023-6903
CVE-2023-6904
CVE-2023-3907