Codiad 2.0.7 Cross Site Scripting

2013-12-20T00:00:00
ID PACKETSTORM:124537
Type packetstorm
Reporter Project Zero Labs
Modified 2013-12-20T00:00:00

Description

                                        
                                            `# Exploit Title: Codiad - Stored (Persistent) Cross Site Scripting Vulnerability  
# Date: 02/12/2013  
# Exploit Author: Project Zero Labs  
# Vendor Homepage: http://www.codiad.com  
# Software Link: https://github.com/Codiad/Codiad  
# Version: v.2.0.7  
# Tested on: Kali Linux / Iceweasel v.22  
  
About the software:  
===================  
  
Codiad is a web-based IDE framework with a small footprint and minimal requirements.  
Demo: http://demo.codiad.com/  
  
  
Vulnerability Details:  
======================  
  
Project Zero Labs identified a stored (persistent) cross site scripting vulnerability in the   
"Project Name" field. For example if we put: <script>alert("XSS Found!");</script>  
as the project name a popup alert will appear every time we trigger the Project Menu or  
the Codiad loads the Project.  
  
An attacker can inject malicious code that will be executed on the victim's browser.  
  
The vulnerability has already reported to the development team via GitHub.  
  
  
Report & Proof Of Concept:  
==========================  
  
A detailed report with screenshots as Proof Of Concept can be found in the software's bug tracker (Github):  
  
https://github.com/Codiad/Codiad/issues/584  
  
  
Payload:  
========  
  
<script>alert("XSS Found!");</script>  
  
  
Severity:  
=========  
Medium  
  
  
Credits:  
========  
  
Project Zero Labs  
  
labs@projectzero.gr  
http://www.projectzero.gr  
  
`