Affected Product: Stimulsoft Dashboards.JS

Affected Versions: <2024.1.2

Fixed Version: 2024.1.3

CVE-Number: CVE-2024-24397

Severity: 7.6 (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:L)

Discovered by Ing. Simon Schönegger, BSc, MSc, DI Lukas Hammer, BSc

During security research, the researchers discovered that Stimulsoft Dashboards.JS is prone to multiple vulnerabilities including Stored Cross Site Scripting.

In order to exploit this vulnerability an attacker is only required to visit the Dashboards Application. This vulnerability is rated as unauthtenticated, since this product does not handle authentication on its own.

Proof of Concept

A XSS payload can be injected in the field ReportName. When the report is loaded, the definition in the file does not get sanitized. Therefore, the payload remains persistent. This behaviour can be triggered by setting the ReportName to <img src=\"#\" onerror=\"alert(1)\"/> Injection of the XSS payload in the ReportName After the report is loaded into the designer, the user may click on Properties and expand the search bar. When such behaviour occurs the XSS payload is triggered and executed. Triggered XSS payload

Vendor contact timeline

2024/01/10Discovery of the vulnerability
2024/01/10Researchers inform vendor about the vulnerability
2024/01/19Vendor informs the researchers, that the vulnerability will be fixed with 2024.1.3
2024/01/19Stimulsoft Dashboards.JS 2024.1.3 is released
2024/01/19Disclosure of the vulnerability to MITRE
2024/02/02MITRE assigns CVE-2024-24397