Lucene search

K
packetstormEduardo Jose de BorbaPACKETSTORM:172185
HistoryMay 08, 2023 - 12:00 a.m.

Rollout::UI 0.5 Cross Site Scripting

2023-05-0800:00:00
Eduardo Jose de Borba
packetstormsecurity.com
178
cross-site scripting
rollout::ui
xss
cve-2023-25309
eduardo josé de borba
heiko webers
rack app

0.003 Low

EPSS

Percentile

65.8%

`1. ADVISORY INFORMATION  
=======================  
  
Exploit Title: Rollout::UI v0.5 Cross-site scripting  
Date: 2023-05-05  
Exploit Author: Eduardo José de Borba  
Vendor Homepage: https://github.com/fetlife  
Software Link: https://github.com/fetlife/rollout-ui  
Type: Cross-Site Scripting [CWE-79]  
Tested on: Linux/OSx  
CVE: 2023-25309  
CVSS Score: 5.3 https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N  
  
2. CREDITS  
==========  
This vulnerability was discovered and researched by Heiko Webers from  
bauland42.  
  
3. VERSIONS AFFECTED  
====================  
  
Rollout::UI <= v0.5  
  
4. INTRODUCTION  
===============  
  
Rollout::UI is a Minimalist UI for the rollout gem that you can just mount as a Rack app.  
  
5. VULNERABILITY DETAILS  
========================  
  
The feature's name isn't escaped properly in the "Do you really want to delete" confirmation dialog.  
When the user clicks "Delete", the page will run the XSS from the feature name.  
  
6. PROOF OF CONCEPT  
===================  
  
The following PoC triggers a JavaScript alert when clicking at the "Delete" button:  
  
http://<host>/features/'+alert(document.cookie)+'  
  
7. SOLUTION  
===========  
Update to Rollout::UI to use the following branch: https://github.com/fetlife/rollout-ui/pull/15. The fix was not accepted by the vendor yet.  
`

0.003 Low

EPSS

Percentile

65.8%

Related for PACKETSTORM:172185