Summary
Attacker can upload a html file with malicious content. If user tries to open that file in browser malicious scripts can be executed leading Stored XSS(Cross-Site Script) attack.
PoC
NocoDB was configured using the Release Binary Noco-macos-arm64
, and nocodb version 0.202.9 (currently the latest version) was used.
binary hash infos: md5(164b727f287af56168bc16fba622d0b4) / sha256(43e8e97f4c5f5330613abe071a359f84e4514b7186f92954b678087c37b7832e)
1. Run the binary to start the server and access the arbitrary table dashboard.
Here, used the default Features
table.
2. Click +
in the table field header
to add an attachment
field.
3. Click the Add File(s)
button to select and upload files.
Here, test.html
containing <script>alert(document.domain)</script>
was uploaded.
4. Check the uploaded file path.
<img width="1163" alt="image" src="https://user-images.githubusercontent.com/86613161/287473337-b1c7c781-2fb5-4bd0-b464-dbd3d4158f04.png"
5. Access the uploaded file path.
When the file path is accessed, the <script>alert(document.domain)</script>
script statement contained in the file is executed and the server host appears in the alert message.
Impact
This allows remote attacker to execute JavaScript code in the context of the user accessing the vector. An attacker could have used this vulnerability to execute requests in the name of a logged-in user or potentially collect information about the attacked user by displaying a malicious form.
References
Summary
Attacker can upload a html file with malicious content. If user tries to open that file in browser malicious scripts can be executed leading Stored XSS(Cross-Site Script) attack.
PoC
NocoDB was configured using the Release Binary
Noco-macos-arm64
, and nocodb version 0.202.9 (currently the latest version) was used.binary hash infos: md5(164b727f287af56168bc16fba622d0b4) / sha256(43e8e97f4c5f5330613abe071a359f84e4514b7186f92954b678087c37b7832e)
1. Run the binary to start the server and access the arbitrary table dashboard.
Here, used the default
Features
table.2. Click
+
in the tablefield header
to add anattachment
field.3. Click the
Add File(s)
button to select and upload files.Here,
test.html
containing<script>alert(document.domain)</script>
was uploaded.4. Check the uploaded file path.
<img width="1163" alt="image" src="https://user-images.githubusercontent.com/86613161/287473337-b1c7c781-2fb5-4bd0-b464-dbd3d4158f04.png"
5. Access the uploaded file path.
When the file path is accessed, the
<script>alert(document.domain)</script>
script statement contained in the file is executed and the server host appears in the alert message.Impact
This allows remote attacker to execute JavaScript code in the context of the user accessing the vector. An attacker could have used this vulnerability to execute requests in the name of a logged-in user or potentially collect information about the attacked user by displaying a malicious form.
References