Confluence RefinedWiki Original Theme Cross Site Scripting

Type packetstorm
Reporter Manuel Hofer
Modified 2014-10-29T00:00:00


                                            `SEC Consult Vulnerability Lab Security Advisory < 20141029-1 >  
title: Persistent cross site scripting  
product: Confluence RefinedWiki Original Theme  
vulnerable version: 3.x - 4.0.x  
fixed version: 4.0.12  
impact: high  
found: 2014-08-07  
by: Manuel Hofer  
SEC Consult Vulnerability Lab  
Vendor description:  
"RefinedWiki Original Theme is the perfect add-on for smarter collaboration  
and documentation. It can turn Confluence into an Intranet or Extranet and  
with improved organization, more intuitive navigation and customizable  
designs, your whole team will love using Confluence."  
Business recommendation:  
By exploiting this vulnerability, users that are able to create or edit  
content, can attack other users of confluence. An attacker might be able to  
gain access to otherwise protected information in confluence.  
It is recommended to upgrade to the latest version of RefinedWiki Original  
Vulnerability overview/description:  
1) Persistent Cross-Site Scripting  
The vulnerability can be used to persistently include HTML- or JavaScript  
code to the "Activity Stream" of confluence. The code is executed in the  
browser of users if they visit the manipulated site. The vulnerability can be  
used to change the contents of the displayed site, redirect to other sites or  
steal user credentials. Additionally, confluence users are potential victims  
of browser exploits and JavaScript Trojans.  
Proof of concept:  
1) Persistent Cross-Site Scripting  
A user with the necessary permissions to create or edit content in Confluence  
can exploit this vulnerability by placing the XSS payload inside the  
vulnerable POST parameter "versionComment" as shown in the following request.  
> POST /pages/doeditpage.action?pageId=111111 HTTP/1.1  
> [...]  
> atl_token=5aabd74e50724eaac8290a3447d9f6e7a179559e&originalVersion=5  
> &title=Title&wysiwygContent=[REMOVED]&watchPageAfterComment=true  
> &versionComment=<script>alert(document.cookie)</script>  
> &notifyWatchers=true&confirm=Save&viewPermissionsUsers=  
> &editPermissionsUsers=&viewPermissionsGroups=&editPermissionsGroups=  
> &parentPageString=&moveHierarchy=true&position=&targetId=&draftId=0  
> &entityId=9012708&newSpaceKey=tools  
The submitted XSS payload gets executed every time a user visits the activity  
stream of the edited page.  
Vulnerable / tested versions:  
According to the vendor, the affected versions are RefinedWiki Original Theme  
are 3.x - 4.0.x.  
Vendor contact timeline:  
2014-08-08: Contacting Atlassian through issue tracking platform at  
2014-08-15: Issue identified as part of the RefinedWiki Original Theme and not  
Confluence itself. Atlassian forwards advisory to RefinedWiki team  
2014-08-15: Vendor acknowledges the vulnerability  
2014-08-18: Vendor provides fixed version  
2014-08-27: Vendor releases fixed version to the public  
2014-10-29: SEC Consult releases security advisory  
Upgrade to the latest version available:  
Fixes are also included in version 3.5.13 and version 4.1  
Advisory URL:  
SEC Consult Vulnerability Lab  
SEC Consult  
Vienna - Bangkok - Frankfurt/Main - Montreal - Singapore - Vilnius - Zurich  
Mooslackengasse 17, 1190 Vienna, Austria  
Phone: +43 1 8903043 0  
Fax: +43 1 8903043 15  
Mail: research at sec-consult dot com  
Interested to work with the experts of SEC Consult?  
Write to  
EOF Manuel Hofer / @2014