Skip to content

7Ragnarok7/Redactor-JS-3-XSS

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

15 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Redactor JS 3 XSS

This repository documents the vulnerability details and exploit for Redactror JS 3 and prior versions.

Metrics

Vulnerability Overview

This Proof of Concept (POC) demonstrates the exploitation of an XSS vulnerability discovered by me recently in the Redactror JS WYSIWYG editor, which affects all versions of Redactor JS 3 and its prior versions. The flaw allows JavaScript execution by embedding a <script> tag inside a <figure> tag within the editor, which the library fails to sanitize.

Prerequisites

  1. Redactor JS (version <= 3.*.*): https://github.com/7Ragnarok7/Redactor-JS-3-XSS/tree/main/docs/redactor3/

Reproduction Steps

This vulnerability can be tested using the pre-configured Redactor JS 3 instance present here.

  1. Switch to Source/HTML mode and insert Payload:

    • Open the Redactor JS instance and click on the "HTML" icon.

    • Insert the following payload in the text area:

      <figure><script>alert`XSS Found`</script></figure>

      Redactor Preview Screenshot

      Payload Insertion Screenshot

  2. Switch to WYSIWYG Mode:

    • Click on the "HTML" icon again to switch back to the WYSIWYG mode.

    • Observe the XSS payload getting triggered.

      XSS Trigger Screenshot

Advisory

Important Links