Note:
This project will be discontinued after December 13, 2021. [more]
2019-10-16
There is a stored XSS in Rambox 0.6.9 that can lead to code execution. The XSS is in the name field while adding/editing a service. The problem occurs due to incorrect sanitization of the name field when being processed and stored. This allows a user to craft a payload for Node.js and Electron, such as an exec of OS commands within the onerror attribute of an IMG element.
Products | Rambox |
Type | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') (CWE-78) Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') (CWE-79) |
First patch | - None (likely due to unavailable code) |
Links | https://github.com/ramboxapp/community-edition/issues/2418 |