Stored XSS in Acronis Cyber Protect Console
Medium
A
Acronis
Submitted None
Actions:
Reported by
sbakhour
Vulnerability Details
Technical details and impact analysis
Dear Acronis Security Team,
## Summary
There is a possibility of storing an XSS on the https://mc-beta-cloud.acronis.com/ui/ console.
## Steps To Reproduce
[add details for how we can reproduce the issue]
1. Login to the console with the given account
2. Go to "Protection" under "PLANS"
3. Click on "Create Plan"
4. Click on "Add devices" and select the device to add (in my case I selected my PC where the agent is installed)
5. Name the new created protection plan with this payload <video><source onerror="blocked:alert(document.domain)">
6. Click on "Create" button and wait till the plan is created
7. Once the plan is created go back to the "Protection" under "Plans" and select the created plan by selecting the checkbox
8. On the "Actions" pane at the right side, click on the "Stop" button
9. A confirmation box will appear to stop the plan
10. Click on the red "Confirm" button and the XSS will fire up
11. Reload the pages by re-visiting https://mc-beta-cloud.acronis.com/ui/
12. Click again on "Protection" under "Plans"
13. Select the plan created with this payload name <video><source onerror="blocked:alert(document.domain)">
14. Repeat steps 8,9,10 and the XSS will fire up again confirming that it is a stored XSS.
## Recommendations
You can prevent XSS by escaping, validating inputs in fields and sanitizing. Plan names are not supposed to contain special characters or payloads.
##Supporting Material/References::
Please refer to the attached screenshot & video for reference.
##Browser Tested:
Mozilla Firefox 68.9.0esr (64-bit)
##Operating System Tested:
Windows 10 Professional 64-bit
Kali Linux 2020 32-bit
## Impact
An XSS attack allows an attacker to execute arbitrary JavaScript in the context of the attacked website and the attacked user. This can be abused to steal session cookies, perform requests in the name of the victim or for phishing attacks.
Report Details
Additional information and metadata
State
Closed
Substate
Resolved
Bounty
$500.00
Submitted
Weakness
Cross-site Scripting (XSS) - Stored