cve/2024/CVE-2024-26152.md
2024-06-18 02:51:15 +02:00

2.7 KiB

CVE-2024-26152

Description

SummaryOn all Label Studio versions prior to 1.11.0, data imported via file upload feature is not properly sanitized prior to being rendered within a Choices or Labels tag, resulting in an XSS vulnerability.### DetailsNeed permission to use the "data import" function. This was reproduced on Label Studio 1.10.1.### PoC1. Create a project.Create a project2. Upload a file containing the payload using the "Upload Files" function.2  Upload a file containing the payload using the Upload Files function3  completeThe following are the contents of the files used in the PoC{ "data": { "prompt": "labelstudio universe image", "images": [ { "value": "id123#0", "style": "margin: 5px", "html": "<img width='400' src='https://labelstud.io/_astro/images-tab.64279c16_ZaBSvC.avif' onload=alert(document.cookie)>" } ] }}3. Select the text-to-image generation labeling template of Ranking and scoring3  Select the text-to-image generation labelling template for Ranking and scoring5  save4. Select a task4  Select a task5. Check that the script is running5  Check that the script is running### ImpactMalicious scripts can be injected into the code, and when linked with vulnerabilities such as CSRF, it can cause even greater damage. In particular, It can become a source of further attacks, especially when linked to social engineering.

POC

Reference

Github