Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2020-27358 PoC — REDCap 授权问题漏洞

Source
Associated Vulnerability
Title:REDCap 授权问题漏洞 (CVE-2020-27358)
Description:REDCap是一款数据收集和管理Web应用程序。 REDCap 8.11.6 9.x至10版本中存在授权问题漏洞,该漏洞允许非特权用户导出另一个用户的会话线程。
Description
CVE-2020-27358 and CVE-2020-27359
Readme
# CVE-2020-27358 / CVE-2020-27359

Exploitation steps for **CVE-2020-27358 and CVE-2020-27359**


## CVE-2020-27358 

An issue was discovered in REDCap 8.11.6 through 9.x before 10. The messenger's CSV feature (that allows users to export their conversation threads as CSV) allows non-privileged users to export one another's conversation threads by changing the thread_id parameter in the request to the endpoint Messenger/messenger_download_csv.php?title=Hey&thread_id={THREAD_ID}. 

#### Testing Steps 
1. Login as any user. 
2. Navaigate to a existing message thread.
3. Click option the export as CSV.
4. Intercept the request and change the thread_id paramter to any valid thread ID.



## CVE-2020-27359 

A cross-site scripting (XSS) issue in REDCap 8.11.6 through 9.x before 10 allows attackers to inject arbitrary JavaScript or HTML in the Messenger feature. It was found that the filename of the image or file attached in a message could be used to perform this XSS attack. A user could craft a message and send it to anyone on the platform including admins. The XSS payload would execute on the other account without interaction from the user on several pages. 

#### Testing Steps 
1. Login as any user. 
2. Navaigate to a existing message thread.
3. Click add an image and upload an image.
4. Intercept the request and change filename to `\"><svg/onload=alert(document.domain)>`
5. Send the message.

You can send the XSS payload to any user on the platform and it will execute without interaction. 
File Snapshot

[4.0K] /data/pocs/6de46b4c9e70006cae80acbc5e8d739da69edfc0 ├── [1.0K] LICENSE └── [1.5K] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.