Analyzing Leantime XSS for the fun time - Diving into CVE-2024-27477 for a beginner!

Analyzing Leantime XSS for the fun time - Diving into CVE-2024-27477 for a beginner!

CVEs

6.1 Medium Severity

Screenshots from the blog posts

images/cluwlap6zo47i1imxeun2g79u.pngimages/cluwlap6zo47i1imxeun2g79u.png

Summary

Leantime is an open-source project, that is a simple yet feature-rich management system for non-project managers. It's version 3.0.6 is vulnerable to a Cross-Site Scripting vulnerability within the ticket creation and modification functionality, allowing attackers to inject malicious JavaScript code into the title field of tickets (also known as To-Dos). In this post, we will dive into this vulnerability and exploit it from an attacker's perspective. Besides the PoC and vulnerability confirmation, the post contains potential attack avenues that an attacker could take. Then we will shift hats and understand the same vulnerability from a source code review, pinpointing the exact code line that caused this issue, and the exact code line that helped fix this issue. Lastly, I leave you with some tips on what mindset to adopt while developing code.

Description

@secatgourity

190 posts

Total vcoins

123.8K

Social media links

Comments (0)