Summary
While Doing Security testing,I found an HTML injection vulnerability on leantime web application
The Profile First & Last Name is vulnerable to HTML injection
Details
- Login to your account > Go to Settings > My Profile
HACKED YOU
Set A Password For Your Account:
2. Put Above HTML injection payload in First & last Name.
3. Now create new article and click on save
4. you will see we in that saved article our html payload is executed Successfully.
PoC
https://drive.google.com/file/d/1aAlWnEcE-zlXcY-HFbWGQbvj7TfBaVHG/view?usp=share_link
Impact
(1)As HTML injection works in email an attacker can trick the victim to click on such hyperlinks to redirect him to any malicious site and also can host an XSS page. Attackers could also use this for phishing, all of this will surely cause some damage to the victim.
(2)HTML injection, Phishing attacks
(3)This vulnerability can lead to the reformatting/editing of emails from an official email address, which can be used in targeted phishing attacks.
(4)This could lead to users being tricked into giving logins away to malicious attackers.
(5) Account Takeover by stealing passwords.
Summary
While Doing Security testing,I found an HTML injection vulnerability on leantime web application
The Profile First & Last Name is vulnerable to HTML injection
Details
HACKED YOU
Set A Password For Your Account:2. Put Above HTML injection payload in First & last Name. 3. Now create new article and click on save 4. you will see we in that saved article our html payload is executed Successfully.
PoC
https://drive.google.com/file/d/1aAlWnEcE-zlXcY-HFbWGQbvj7TfBaVHG/view?usp=share_link
Impact
(1)As HTML injection works in email an attacker can trick the victim to click on such hyperlinks to redirect him to any malicious site and also can host an XSS page. Attackers could also use this for phishing, all of this will surely cause some damage to the victim.
(2)HTML injection, Phishing attacks
(3)This vulnerability can lead to the reformatting/editing of emails from an official email address, which can be used in targeted phishing attacks.
(4)This could lead to users being tricked into giving logins away to malicious attackers.
(5) Account Takeover by stealing passwords.