Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-qg73-g3cf-vhhh

Опубликовано: 13 мая 2024
Источник: github
Github: Прошло ревью
CVSS3: 5.7

Описание

NocoDB Allows Preview of Files with Dangerous Content

Summary


Attacker can upload a html file with malicious content. If user tries to open that file in browser malicious scripts can be executed leading Stored XSS(Cross-Site Script) attack.

PoC


NocoDB was configured using the Release Binary Noco-macos-arm64, and nocodb version 0.202.9 (currently the latest version) was used. binary hash infos: md5(164b727f287af56168bc16fba622d0b4) / sha256(43e8e97f4c5f5330613abe071a359f84e4514b7186f92954b678087c37b7832e) image

1. Run the binary to start the server and access the arbitrary table dashboard.

image

Here, used the default Features table.

2. Click + in the table field header to add an attachment field.

image

3. Click the Add File(s) button to select and upload files.

image

Here, test.html containing <script>alert(document.domain)</script> was uploaded.

4. Check the uploaded file path.

<img width="1163" alt="image" src="https://user-images.githubusercontent.com/86613161/287473337-b1c7c781-2fb5-4bd0-b464-dbd3d4158f04.png"

5. Access the uploaded file path.

image

When the file path is accessed, the <script>alert(document.domain)</script> script statement contained in the file is executed and the server host appears in the alert message.

Impact


This allows remote attacker to execute JavaScript code in the context of the user accessing the vector. An attacker could have used this vulnerability to execute requests in the name of a logged-in user or potentially collect information about the attacked user by displaying a malicious form.

Пакеты

Наименование

nocodb

npm
Затронутые версииВерсия исправления

>= 0.202.6, <= 0.202.9

0.202.10

EPSS

Процентиль: 63%
0.0044
Низкий

5.7 Medium

CVSS3

Дефекты

CWE-434
CWE-79

Связанные уязвимости

CVSS3: 5.7
nvd
больше 1 года назад

NocoDB is software for building databases as spreadsheets. Starting in verson 0.202.6 and prior to version 0.202.10, an attacker can upload a html file with malicious content. If user tries to open that file in browser malicious scripts can be executed leading stored cross-site scripting attack. This allows remote attacker to execute JavaScript code in the context of the user accessing the vector. An attacker could have used this vulnerability to execute requests in the name of a logged-in user or potentially collect information about the attacked user by displaying a malicious form. Version 0.202.10 contains a patch for the issue.

EPSS

Процентиль: 63%
0.0044
Низкий

5.7 Medium

CVSS3

Дефекты

CWE-434
CWE-79