header-logo
Suggest Exploit
vendor:
ThingsBoard
by:
Steffen Langenfeld & Sebastian Biehler
4.8
CVSS
MEDIUM
Stored Cross-Site Scripting (XSS)
79
CWE
Product Name: ThingsBoard
Affected Version From: 3.3.2001
Affected Version To: 3.3.2001
Patch Exists: YES
Related CWE: CVE-2021-42750
CPE: a:thingsboard:thingsboard:3.3.1
Metasploit:
Other Scripts:
Platforms Tested: Linux
2022

ThingsBoard 3.3.1 ‘name’ – Stored Cross-Site Scripting (XSS)

When creating a rule node (any) and putting a script payload inside the name of the rule node, it is executed upon hovering above the node within the editor.

Mitigation:

Input validation and output encoding should be used to prevent XSS attacks.
Source

Exploit-DB raw data:

# Exploit Title:  ThingsBoard 3.3.1 'name' - Stored Cross-Site Scripting (XSS)
# Date: 03/08/2022
# Exploit Author: Steffen Langenfeld & Sebastian Biehler
# Vendor Homepage: https://thingsboard.io/
# Software Link: https://github.com/thingsboard/thingsboard/releases/tag/v3.3.1
# Version: 3.3.1
# CVE : CVE-2021-42750
# Tested on: Linux

#Proof-Of-Concept:
When creating a rule node (any) and putting a script payload inside the name of the rule node, it is executed upon hovering above the node within the editor.

#Steps

1. Create a new rule node (via the menu "Rule chains")
2. Put a javascript payload within the name e.g <script>alert('XSS')</script>
3. Save the node
4. Upon hovering above the node within the editor the payload is executed