mirror of
https://github.com/0xMarcio/cve.git
synced 2025-06-01 11:10:36 +00:00
18 lines
2.7 KiB
Markdown
18 lines
2.7 KiB
Markdown
![]() |
### [CVE-2024-26152](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26152)
|
||
|

|
||
|

|
||
|
&color=brighgreen)
|
||
|
|
||
|
### Description
|
||
|
|
||
|
### SummaryOn all Label Studio versions prior to 1.11.0, data imported via file upload feature is not properly sanitized prior to being rendered within a [`Choices`](https://labelstud.io/tags/choices) or [`Labels`](https://labelstud.io/tags/labels) tag, resulting in an XSS vulnerability.### DetailsNeed permission to use the "data import" function. This was reproduced on Label Studio 1.10.1.### PoC1. Create a project.2. Upload a file containing the payload using the "Upload Files" function.The following are the contents of the files used in the PoC```{ "data": { "prompt": "labelstudio universe image", "images": [ { "value": "id123#0", "style": "margin: 5px", "html": "<img width='400' src='https://labelstud.io/_astro/images-tab.64279c16_ZaBSvC.avif' onload=alert(document.cookie)>" } ] }}```3. Select the text-to-image generation labeling template of Ranking and scoring4. Select a task5. Check that the script is running### ImpactMalicious scripts can be injected into the code, and when linked with vulnerabilities such as CSRF, it can cause even greater damage. In particular, It can become a source of further attacks, especially when linked to social engineering.
|
||
|
|
||
|
### POC
|
||
|
|
||
|
#### Reference
|
||
|
- https://github.com/HumanSignal/label-studio/security/advisories/GHSA-6xv9-957j-qfhg
|
||
|
|
||
|
#### Github
|
||
|
- https://github.com/fkie-cad/nvd-json-data-feeds
|
||
|
|