Uploaded image for project: 'Xray for Jira'
  1. Xray for Jira
  2. XRAY-10132

AMS-27078 - Stored XSS via [User profile name] at assign [Test permission error]

    XporterXMLWordPrintable

Details

    • Xray 2024 S6
    • OK

    Description

      How to reproduce:

      • Create an user A - admin
      • Create a user B
      • Log in with user B and go to your profile 
      • Update user B full name to 
        "><img src=x onerror=prompt(123)>
      • Logout
      • Login with user A
      • MAke sure that user B does not have permission to browse the project you will use
      • create a test execution and add a test
      • Click on actions -> assign -> search for user B and select it
      • Click Assign
      • The dialog is closed and the prompt appears

       

      What is this ticket?

      This ticket tracks the corresponding Bugcrowd submission 1b8e95f3-0075-492b-8132-77287611532c. Please make a note of the triage and remediation due dates for this ticket.
      You are not expected to update the status of the ticket. We will automatically sync the status of the Bugcrowd submission for you :smiley: Please continue to accept, reject, and close submissions directly in the Bugcrowd portal.

      What can I do with this ticket?

      :one: Ensure that you are actioning on the submission within the Triage Due Date & Remediation Due Date. Learn more about our Bug Fix Policy here.
      :two: Request an SLA extension if you need more time. Learn more about SLA management here.
      :three: Engage with our Atlassian Security team by simply commenting on the ticket.
      :four: Use our partner dashboard to monitor all your SLA’s at one place and analyze trends.

      Ticket updates:

      If you are interested in receiving notifications on all ticket updates, please add yourself to the watchers list.

      Requesting a SLA extension:

      If you need to request an extension to fix the vulnerability, transition this ticket to the
      EXTENSION REQUESTED
      status.

      SLA violation notifications:

      You will be notified through email and this ticket as the SLA Due dates approach.

      :flag_on: If you would like to de-list/retire your marketplace app, please create a request here. After you have created the request, please comment with a link to the ticket. Lastly, transition this ticket to the
      ATLASSIAN INPUT REQUESTED
      status.

      :question_mark: Need any other help? Please comment on this ticket or you can create a ticket here.

      1. Stored Cross-Site Scripting (Privileged User to Privilege Elevation)
        1. Overview of the Vulnerability

      Stored Cross-Site Scripting (XSS) is a type of injection attack where malicious JavaScript is injected into a website. When a user visits the affected web page, the Javascript executes within that user’s browser in the context of this domain. Stored XSS can be found on this domain which allows an attacker to submit data to a form and escalate from a privileged user to a higher privileged user, which could include an Administrator level user.

      When an attacker can control code that is executed within a user’s browser, they are able to carry out any actions that the user is able to perform, including accessing any of the user's data and modifying information within the user’s permissions. This can result in modification, deletion, or theft of data, including accessing or deleting files, or stealing session cookies which an attacker could use to hijack a user’s session.

        1. Business Impact

      Stored XSS at [Xray](https://marketplace.atlassian.com/apps/1211769/xray-test-management-for-jira?hosting=datacenter&tab=overview) add-on via [User profile name] at assign [Test permission error]

        1. Steps to Reproduce

      1. Admin install [Xray](https://marketplace.atlassian.com/apps/1211769/xray-test-management-for-jira?hosting=datacenter&tab=overview) add-on.

      1. Admin Add new UserB with user role.

      1. UserB navigate to their account and inject XSS Payload in profile name.
      > ![image-2024-01-01T23:42:15.135Z.png](https://bugcrowd.com/xpandit/submissions/1b8e95f3-0075-492b-8132-77287611532c/attachments/cb52dbd2-e307-490f-955c-952e361e0bcf "image-2024-01-01T23:42:15.135Z.png")

      1. Admin navigate to {}Project > Create project > select Xray project{}.
      > ![image-2024-01-01T23:32:31.290Z.png](https://bugcrowd.com/xpandit/submissions/1b8e95f3-0075-492b-8132-77287611532c/attachments/202ae307-824c-4ca8-8d00-60ecc3e9b098 "image-2024-01-01T23:32:31.290Z.png")

      1. Admin navigate to {}Xray project > Project setting > Users and roles{} then restrict project for admin only.
      > ![image-2024-01-01T23:35:08.734Z.png](https://bugcrowd.com/xpandit/submissions/1b8e95f3-0075-492b-8132-77287611532c/attachments/ebfafcd3-bbe7-4756-b147-3baa5d760493 "image-2024-01-01T23:35:08.734Z.png")

      1. Navigate to {}Xray project > Project setting > Permissions{} then restrict project for admin only.
      > ![image-2024-01-01T23:35:20.343Z.png](https://bugcrowd.com/xpandit/submissions/1b8e95f3-0075-492b-8132-77287611532c/attachments/c589cc46-5374-474f-87e4-4518f50a5c18 "image-2024-01-01T23:35:20.343Z.png")

      1. Admin create `Test Execution and Test issue`
      > ![image-2024-01-01T23:40:46.210Z.png](https://bugcrowd.com/xpandit/submissions/1b8e95f3-0075-492b-8132-77287611532c/attachments/c1378c06-a2e0-4388-9e1e-5dd18fcfd562 "image-2024-01-01T23:40:46.210Z.png")

      1. Admin navigate to {}Test Execution > then at Test section add Test issue created previously.{}
      > ![image-2024-01-01T23:44:30.050Z.png](https://bugcrowd.com/xpandit/submissions/1b8e95f3-0075-492b-8132-77287611532c/attachments/a39de435-0818-4367-9d7d-1522aa4a381d "image-2024-01-01T23:44:30.050Z.png")

      1. Admin After link test {}click in checkbox > Action > Assign{}
      > ![image-2024-01-01T23:48:54.337Z.png](https://bugcrowd.com/xpandit/submissions/1b8e95f3-0075-492b-8132-77287611532c/attachments/02556f4d-d6fe-4923-ada7-81574fd30d19 "image-2024-01-01T23:48:54.337Z.png")

      1. If {}Admin/Any other users{} select UserB and click __Assign; Observe the JavaScript payload being executed
      > ![image-2024-01-01T23:53:19.544Z.png](https://bugcrowd.com/xpandit/submissions/1b8e95f3-0075-492b-8132-77287611532c/attachments/8c419c42-d99a-435c-9f37-6500c40149da "image-2024-01-01T23:53:19.544Z.png")
      > ![image-2024-01-01T23:53:29.530Z.png](https://bugcrowd.com/xpandit/submissions/1b8e95f3-0075-492b-8132-77287611532c/attachments/efe996c7-a9d2-4844-8b2c-d06182c97241 "image-2024-01-01T23:53:29.530Z.png")

        1. Proof of Concept (PoC)
          [2024-01-02%2002-53-45.mp4](https://bugcrowd.com/xpandit/submissions/1b8e95f3-0075-492b-8132-77287611532c/attachments/d5418b13-bfc1-49fe-b5f8-75dec34d56e9 "2024-01-02%2002-53-45.mp4")
          Bugcrowd Submission Info:

      Attachments

        1. AMS-27078.doc
          71 kB
          Nikhil Diwan
        2. image-2024-06-27-09-40-56-408.png
          65 kB
          Diamantino Campos
        3. image-2024-06-27-09-41-45-193.png
          311 kB
          Diamantino Campos

        Issue Links

          Activity

            People

              nikhil.diwan Nikhil Diwan
              nikhil.diwan Nikhil Diwan
              António Rodrigues, Patricia Mateo
              Votes:
              0 Vote for this issue
              Watchers:
              0 Start watching this issue

              Dates

                Created:
                Updated:
                Resolved:

                Time Tracking

                  Estimated:
                  Original Estimate - Not Specified
                  Not Specified
                  Remaining:
                  Remaining Estimate - 0 minutes
                  0m
                  Logged:
                  Time Spent - 7 hours, 50 minutes
                  7h 50m