Skip to content

HTML injection through FIRST And LAST Name

Moderate
marcelfolaron published GHSA-qrfh-cc86-vc8c Nov 16, 2024

Package

No package listed

Affected versions

<2.4

Patched versions

2.4

Description

Summary

While Doing Security testing,I found an HTML injection vulnerability on leantime web application
The Profile First & Last Name is vulnerable to HTML injection

Details

  1. Login to your account > Go to Settings > My Profile

HACKED YOU

Set A Password For Your Account:

2. Put Above HTML injection payload in First & last Name. 3. Now create new article and click on save 4. you will see we in that saved article our html payload is executed Successfully.

PoC

https://drive.google.com/file/d/1aAlWnEcE-zlXcY-HFbWGQbvj7TfBaVHG/view?usp=share_link

Impact

(1)As HTML injection works in email an attacker can trick the victim to click on such hyperlinks to redirect him to any malicious site and also can host an XSS page. Attackers could also use this for phishing, all of this will surely cause some damage to the victim.
(2)HTML injection, Phishing attacks
(3)This vulnerability can lead to the reformatting/editing of emails from an official email address, which can be used in targeted phishing attacks.
(4)This could lead to users being tricked into giving logins away to malicious attackers.
(5) Account Takeover by stealing passwords.

Severity

Moderate

CVE ID

No known CVE

Weaknesses

Credits