Security
Headlines
HeadlinesLatestCVEs

Headline

Thingsboard 3.3.1 Cross Site Scripting

Thingsboard version 3.3.1 suffers from multiple persistent cross site scripting vulnerabilities.

Packet Storm
#xss#vulnerability#linux#git#java#auth
# Exploit Title: ThingsBoard 3.3.1 - Stored Cross-Site Scripting (XSS) within the description of a rule node# Date: 03/08/2022# Exploit Author: Steffen Langenfeld & Sebastian Biehler# Vendor Homepage: https://thingsboard.io/# Software Link: https://github.com/thingsboard/thingsboard/releases/tag/v3.3.1# Version: 3.3.1# Tested on: [relevant os]# CVE : CVE-2021-42751# Tested on: Linux#Proof-Of-Concept:When creating a rule node (any) and putting a script payload inside the description of the rule node, it is executed upon hovering above the node within the editor.#Steps1. Create a new rule node (via the menu "Rule chains")2. Put a javascript payload within the description e.g <script>alert('XSS')</script>3. Save the node4. Upon hovering above the node within the editor the payload is executed# Exploit Title:  ThingsBoard 3.3.1 - Stored Cross-Site Scripting (XSS) within the name of a rule node----------# Date: 03/08/2022# Exploit Author: Steffen Langenfeld & Sebastian Biehler# Vendor Homepage: https://thingsboard.io/# Software Link: https://github.com/thingsboard/thingsboard/releases/tag/v3.3.1# Version: 3.3.1# CVE : CVE-2021-42750# Tested on: Linux#Proof-Of-Concept:When creating a rule node (any) and putting a script payload inside the name of the rule node, it is executed upon hovering above the node within the editor.#Steps1. Create a new rule node (via the menu "Rule chains")2. Put a javascript payload within the name e.g <script>alert('XSS')</script>3. Save the node4. Upon hovering above the node within the editor the payload is executed

Related news

CVE-2021-42751: GitHub - thingsboard/thingsboard: Open-source IoT Platform - Device management, data collection, processing and visualization.

A cross-site scripting (XSS) vulnerability in Rule Engine in ThingsBoard 3.3.1 allows remote attackers (with administrative access) to inject arbitrary JavaScript within the description of a rule node.

Packet Storm: Latest News

ABB Cylon Aspect 3.07.02 user.properties Default Credentials