-
Bug
-
Resolution: Fixed
-
High
-
8.5.2
-
Severity 3 - Minor
-
Issue Summary
Confluence Cloud DC is suceptable to XSS and account takeover via comments once comment is resolved. Data storage is not properly storing comments and sanitizing properly which enables the code to run. The POC showed the attackers' ability to leak document.cookies which could lead to other cookie based vuln.
Vulnerability was validated on v8.5.2 via instantenv. Customer reported vulnerability is present on <v8.5.20 and v9.0+.
Steps to Reproduce
- Create new page
- Insert code <img/src=z onerror=alert(document.domain);> onto page. And publish
- Highlight code, and add a comment. Save the comment.

Mark comment as resolved
- Click the 3 dots in the top right corner and click on “Resolved comments”

Watch the XSS execute. Customer was able to grab document.cookie value.

Expected Results
XSS should not be allowed to execute.
Actual Results
XSS executes, Customer was able to grab document.cookie value.
Workaround
- Validate vulnerability on versions less than v8.5.20 and versions 9.0 and higher. And patch if neccessary.
- Sanitize highlighted comment associated with comment when storing and retrieving text
-
- Either sanitize before render
-
- Or Encode on storage
- Defense in Depth: Implement appropriate CSP headers to prevent render.
- follows
-
VULN-1618301 Loading...