# Exploit Title: ThingsBoard 3.3.1 - Stored Cross-Site Scripting (XSS) within the description of a rule node # Date: 03/08/2022 # Exploit Author: Steffen Langenfeld & Sebastian Biehler # Vendor Homepage: https://thingsboard.io/ # Software Link: https://github.com/thingsboard/thingsboard/releases/tag/v3.3.1 # Version: 3.3.1 # Tested on: [relevant os] # CVE : CVE-2021-42751 # Tested on: Linux #Proof-Of-Concept: When creating a rule node (any) and putting a script payload inside the description of the rule node, it is executed upon hovering above the node within the editor. #Steps 1. Create a new rule node (via the menu "Rule chains") 2. Put a javascript payload within the description e.g 3. Save the node 4. Upon hovering above the node within the editor the payload is executed# Exploit Title: ThingsBoard 3.3.1 - Stored Cross-Site Scripting (XSS) within the name of a rule node ---------- # Date: 03/08/2022 # Exploit Author: Steffen Langenfeld & Sebastian Biehler # Vendor Homepage: https://thingsboard.io/ # Software Link: https://github.com/thingsboard/thingsboard/releases/tag/v3.3.1 # Version: 3.3.1 # CVE : CVE-2021-42750 # Tested on: Linux #Proof-Of-Concept: When creating a rule node (any) and putting a script payload inside the name of the rule node, it is executed upon hovering above the node within the editor. #Steps 1. Create a new rule node (via the menu "Rule chains") 2. Put a javascript payload within the name e.g 3. Save the node 4. Upon hovering above the node within the editor the payload is executed