what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Relate Cross Site Scripting

Relate Cross Site Scripting
Posted Apr 18, 2024
Authored by kai6u

Relate learning and teaching system versions prior to 2024.1 suffer from a persistent cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 3a5eecac3aca18d20a7a031bd440baad2966d7f4f2e4228a13dd171b4d91f376

Relate Cross Site Scripting

Change Mirror Download
# Exploit Title: Relate Learning And Teaching system Version before 2024.1 Stored XSS
# Date: 18/04/2024
# Exploit Author: kai6u
# Vendor Homepage: https://github.com/inducer/
# Software Link: https://github.com/inducer/relate
# Affected Version:before 2024.1 (https://github.com/inducer/relate/commit/2fdbd4480a2d0a45c746639be244a61a0d4112b6)
# Fixed Version:2024.1 (https://github.com/inducer/relate/commit/d9fa7dcb84b8e5a64ce78ced4f56cdd61c0d59aa)
# Tested on: Ubuntu 22.04
# Summary:
Stored XSS in Relate

# Description:
* 【Prerequisite】
* The attacker has stolen the privilege to answer the exam content. For example, attacker is logged in as a student and have obtained Exam tickets to take the exam.
* The exam is using the following question yaml file.
* https://github.com/inducer/relate-sample/blob/main/questions/multi-question-example.yml

* Stored XSS is performed when the payload is stored and the results are referenced when the exam content is submitted.

1) First, Attacker answer question with below payload.
* Paylod:
* `<script>alert(1)</script>`
2) Next, Course Administrator or Instructor logged in and check answer of this student.( with Exam Analytics view)
* Access to quiz_start/inlinemultin url.
3) Executed Payload and Alert was popped up.
* An attacker can use this feature to force arbitrary requests via JavaScript on users who can view the results.( The content of the request to be enforced and the source code of the malicious JavaScript are described below. )

# References
https://portswigger.net/web-security/cross-site-scripting/stored

Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    18 Files
  • 19
    Nov 19th
    7 Files
  • 20
    Nov 20th
    13 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close