Security
Headlines
HeadlinesLatestCVEs

Headline

CVE-2023-25309: Rollout::UI 0.5 Cross Site Scripting ≈ Packet Storm

Cross Site Scripting (XSS) Vulnerability in Fetlife rollout-ui version 0.5, allows attackers to execute arbitrary code via a crafted url to the delete a feature functionality.

CVE
#xss#vulnerability#web#linux#git#java#perl#auth
  1. ADVISORY INFORMATION
    =======================

Exploit Title: Rollout::UI v0.5 Cross-site scripting
Date: 2023-05-05
Exploit Author: Eduardo José de Borba
Vendor Homepage: https://github.com/fetlife
Software Link: https://github.com/fetlife/rollout-ui
Type: Cross-Site Scripting [CWE-79]
Tested on: Linux/OSx
CVE: 2023-25309
CVSS Score: 5.3 https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N

  1. CREDITS
    ==========
    This vulnerability was discovered and researched by Heiko Webers from
    bauland42.

  2. VERSIONS AFFECTED
    ====================

Rollout::UI <= v0.5

  1. INTRODUCTION
    ===============

Rollout::UI is a Minimalist UI for the rollout gem that you can just mount as a Rack app.

  1. VULNERABILITY DETAILS
    ========================

The feature’s name isn’t escaped properly in the “Do you really want to delete” confirmation dialog.
When the user clicks "Delete", the page will run the XSS from the feature name.

  1. PROOF OF CONCEPT
    ===================

The following PoC triggers a JavaScript alert when clicking at the “Delete” button:

http://<host>/features/’+alert(document.cookie)+’

  1. SOLUTION
    ===========
    Update to Rollout::UI to use the following branch: https://github.com/fetlife/rollout-ui/pull/15. The fix was not accepted by the vendor yet.

CVE: Latest News

CVE-2023-50976: Transactions API Authorization by oleiman · Pull Request #14969 · redpanda-data/redpanda
CVE-2023-6905
CVE-2023-6903
CVE-2023-6904
CVE-2023-3907