OrangeScrum 2.0.11 - Reflected XSS via filename
7.3
High
Discovered by

Offensive Team, Fluid Attacks
Summary
Full name
OrangeScrum 2.0.11 - Reflected XSS via filename
Code name
State
Public
Release date
Feb 13, 2023
Affected product
OrangeScrum
Affected version(s)
2.0.11
Vulnerability name
Reflected cross-site scripting (XSS)
Vulnerability type
Remotely exploitable
Yes
CVSS v3.1 vector string
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N
CVSS v3.1 base score
7.3
Exploit available
No
CVE ID(s)
Description
OrangeScrum version 2.0.11 allows an external attacker to obtain arbitrary user accounts from the application. This is possible because the application returns malicious user input in the response with the content-type set to text/html.
Vulnerability
This vulnerability occurs because the application returns malicious user input in the response with the content-type set to text/html.
Exploitation
To exploit this vulnerability, we only need to send the following malicious HTML code to an application user.
Exploit.html
The malicious JavaScript that we embed in the page is as follows.
Exploit-utils.js
Thus, when the user clicks on the malicious link, it will send its session cookie to the attacker's server logs.
Evidence of exploitation


Our security policy
We have reserved the ID CVE-2023-0624 to refer to this issue from now on. Disclosure policy
System Information
Version: OrangeScrum 2.0.11
Operating System: GNU/Linux
Mitigation
There is currently no patch available for this vulnerability.
References
Vendor page https://github.com/Orangescrum/orangescrum/
Timeline
Vulnerability discovered
Feb 7, 2023
Vendor contacted
Feb 7, 2023
Vendor replied
Feb 7, 2023
Public disclosure
Feb 13, 2023