27 lines
No EOL
1 KiB
Text
27 lines
No EOL
1 KiB
Text
# Exploit Title: Persistent XSS via Markdown on Telescope <= 0.9.2
|
|
# Date: Aug 22 2014
|
|
# Exploit Author: shubs
|
|
# Vendor Homepage: http://www.telescopeapp.org/
|
|
# Software Link: https://github.com/TelescopeJS/Telescope
|
|
# Version: <= 0.9.2
|
|
# CVE : CVE-2014-5144
|
|
|
|
Telescope 0.9.2 and below suffer from a persistent cross site scripting
|
|
vulnerability due to the lack of input sanitisation and validation
|
|
performed when parsing markdown user input. An authenticated user can
|
|
include links, images, code blocks and more through markdown, in the form
|
|
of comments, posts or replies and more.
|
|
|
|
As an example, the following vectors below can be used in comments, posts
|
|
or replies to trigger the XSS:
|
|
|
|
[notmalicious](javascript:window.onerror=alert;throw%20document.cookie)
|
|
[a](data:text/html;base64,PHNjcmlwdD5hbGVydCgnWFNTJyk8L3NjcmlwdD4K)
|
|
|
|
Once posted as comments, the above markdown is converted to links without
|
|
any sanitisation. When such links are clicked, the vector is executed
|
|
successfully.
|
|
|
|
Screenshots:
|
|
http://i.imgur.com/6SQgUYd.png
|
|
http://i.imgur.com/6VeZasj.png |