SIK-2017-001


Title:

Stored and Reflected XSS in pdf-express.org Website

Report ID

SIK-2017-001

Summary:

  • Vendor: IEEE
  • Product: pdf-express.org Website
  • Affected Version:
  • Severity: medium
  • Short summary: Reflected and Stored XSS possible in pdf-express.org website.

Details:

There is no proper input validation check for the text entered in the fields in the login page of the https://www.pdf-express.org/ website. This results to a reflected XSS attack (OWASP Link)). As an example, if an attacker fills out the following:

Conference ID: "><script>alert("XSS")</script>
Email Address: test@test.org
Password: supersecure

You will get a pop-up showing „XSS“. More concrete attacks are described here.

If I create a new account and create a password containing "><script>alert("XSS")</script> for example, the XSS is persistent.

Workaround

Suggested Mitigation

There needs to be a proper input sanitization. More details can be found at https://www.owasp.org/index.php/Data_Validation

Timeline

  • 2017-02-03 Vulnerability Discovered
  • 2017-02-06 Barbara contacted me and sent me a link to Dropbox to upload the report
  • 2017-05-08 Vulnerability is not fixed, vendor needs more time
  • 2018-08-01 Published