PoC for CVE-2024-25503# CVE-2024-25503
> **Vulnerability type : Cross Site Scripting (XSS)** <br>
> **Product: Advanced REST Client desktop application** <br>
> **Vulnerable Version: 17.0.9** <br>
> **Vendor of the product(s): https://www.advancedrestclient.com/** <br>
## 1. Description
Cross-Site Scripting (XSS) vulnerability in Advanced REST Client v.17.0.9 allows a remote attacker to execute arbitrary code and obtain sensitive information.
This can be achieved by exploiting a crafted script within the 'edit details' parameter of the New Project function.
<br><br>
## 2. Attack Vectors
This vulnerability arises when an attacker maliciously stores a 'XSS' script in the project description (Markdown format), shares the project with the victim, and then executes the shared project on the victim's PC using the ARC App.
<br><br>
## 3. Proof-of-Concept (PoC)
#### Step 1) Click on the '+ADD A PROJECT' button on the third tab after running the Advanced REST Client.

<br><br>
#### Step 2) Click the 'Open details' tab to view the created project.

<br><br>
#### Step 3) Click on the 'Edit details' tab in the created New Project.

<br><br>
#### Step 4) Attacker writes 'XSS script' and clicks 'SAVE' button.
```html
<!--Used 'XSS script' for information leakage-->
<img src=# onerror="alert(document.location)">
<!--Another 'XSS script' for phishing-->
<img src=# onerror="alert(document.location)">
```

<br><br>
#### Step 5) When opening a project, a 'XSS script' may generate an alert(information leakage)

<br><br>
#### or load an attacker's page(phishing).

<br><br>
#### Step 6) Projects created by attackers can be exported through the 'Export project' function.

<br><br>
#### Step 7) Attacker names the project and clicks the 'EXPORT' button to export the project where the 'XSS script' is stored.

<br><br>
#### Step 8) This app also has the ability to import a project.

<br><br>
#### Step 9) Victim selects 'import all versions of ARC data' from the top tab to open the projectreceived from the attacker.

<br><br>
#### Step 10) When clicking a 'SELECT FILE' button for victim to open malicious project file containing 'XSS script'.

<br><br>
#### Step 11) After the file selection is completed, click the 'IMPORT DATA' button to importsuccessfully.

<br><br>
#### Step 12) Imported file runs and attacker's 'Stored XSS script' runs on victim's 'Advanced RESTClient (ARC) App'.

<br><br>
## 4. Additional Information
* If the victim executes a project that includes malicious payloads shared by the attacker, it is dangerous because the victim cannot immediately notice the payload.
* For example, this vulnerability can be used to steal sensitive information or perform malicious behavior by reading a user's browser URL.
* You can also perform phishing attacks by redirecting users to other sites. Be careful if an XSS vulnerability is exploited in a phishing attack, which can lead to external exposure of sensitive information.
<br><br>
## 5. Discoverer
* E-mail: irene0seo97@gmail.com
* Github: https://github.com/YOUNGSEO-PARK
[4.0K] /data/pocs/912820a07a15b9a70b74f30dac088f54a924c9db
├── [4.2K] README.md
└── [ 103] xss_script.html
0 directories, 2 files