Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2021-36747 PoC — Blackboard Learn 跨站脚本漏洞

Source
Associated Vulnerability
Title:Blackboard Learn 跨站脚本漏洞 (CVE-2021-36747)
Description:Blackboard Learn是美国Blackboard公司的一套学习管理系统。 Blackboard Learn存在安全漏洞,该漏洞允许认证用户通过反馈给学习者的形式跨站。
Readme
# CVE-2021-36747

### Blackboard Learn through 9.1 allows XSS by an authenticated user via the Feedback to Learner form.

</br>

#### Discovered: May 11th, 2018
*The Blackboard Security Team has been notified of this issue. They acknowledged the vulnerability on May 14, 2018.*
</br>

#### Description:
The Blackboard tool commonly used in K-12 and Higher Education allows Instructors and Graders to provide feedback on assignments submitted. This feedback is plaintext that is converted to HTML. This could allow malicious actors to insert Javascript, which would be executed in the Learner's web browser when viewing the feedback.
</br>

#### Impact:
An arbitrary script may be executed on the user's web browser (CWE-79).
</br>

#### Affected Versions:
Version 9.1 and earlier versions that include the ability to edit HTML when providing Feedback to Learner in the grading process.
</br>

#### Steps to Reproduce:
1. To exploit the vulnerability, the attacker must enter a <script> open and </script> close tag in the Feedback to Learner area of the assignment grading tool
2. On submission, the script is stored in the comment section of the assignment. When the student user views the comment on their Grades page, the script is executed
</br>

#### Screenshots
![alt text](https://github.com/cseasholtz/CVE-2021-36747/blob/main/Feedback-to-Learner.png "Feedback to Learner")
![alt text](https://github.com/cseasholtz/CVE-2021-36747/blob/main/Results.png "Results")
</br>
File Snapshot

[4.0K] /data/pocs/f73f8bed6788a1e7ca1a8a6d4985c44c81caff5f ├── [ 18K] Feedback-to-Learner.png ├── [1.4K] README.md └── [ 56K] Results.png 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.