[GH-ISSUE #271] Cross Site Scripting On Tags (https://demo.papermerge.com/admin/tags) #219

Closed
opened 2026-02-25 21:31:28 +03:00 by kerem · 12 comments
Owner

Originally created by @omemishra on GitHub (Dec 25, 2020).
Original GitHub issue: https://github.com/ciur/papermerge/issues/271

Originally assigned to: @ciur on GitHub.

Dear Team,

Hope you are doing very well, i was looking into the application and i find that i can access to guest option so i was checking your application and i find a stored cross site scripting on Tags option.

Steps:-

  1. Open the following URL "https://demo.papermerge.com/admin/tags"
  2. Click on important
  3. Now in the "Description (optional):" enter the payload "Ome Mishra "><svg/onload=alert("XSS_By_OME")>"
  4. Click on save
  5. Now you will find that your xss will execute successfully.

Impacts:-

  1. Can leads to session hijacking
  2. Redirection
  3. All XSS related issue are very critical

Adding POC down below
POC-1
POC-2

Thanks & Regards
Ome

Originally created by @omemishra on GitHub (Dec 25, 2020). Original GitHub issue: https://github.com/ciur/papermerge/issues/271 Originally assigned to: @ciur on GitHub. Dear Team, Hope you are doing very well, i was looking into the application and i find that i can access to guest option so i was checking your application and i find a stored cross site scripting on Tags option. Steps:- 1. Open the following URL "https://demo.papermerge.com/admin/tags" 2. Click on important 3. Now in the "Description (optional):" enter the payload "**Ome Mishra "><svg/onload=alert("XSS_By_OME")>**" 4. Click on save 5. Now you will find that your xss will execute successfully. Impacts:- 1. Can leads to session hijacking 2. Redirection 3. All XSS related issue are very critical Adding POC down below ![POC-1](https://user-images.githubusercontent.com/25466820/103129030-51331e80-46bd-11eb-85cd-897dacf3a716.jpg) ![POC-2](https://user-images.githubusercontent.com/25466820/103129035-53957880-46bd-11eb-81c2-12bd15771c88.jpg) Thanks & Regards Ome
kerem 2026-02-25 21:31:28 +03:00
Author
Owner

@ciur commented on GitHub (Dec 26, 2020):

@omemishra, thank you for your security audit. I will fix this issue.

<!-- gh-comment-id:751321789 --> @ciur commented on GitHub (Dec 26, 2020): @omemishra, thank you for your security audit. I will fix this issue.
Author
Owner

@ciur commented on GitHub (Dec 27, 2020):

Fixed in 1.5.x branch.
Fix is available as part of 1.5.5 release.
This is actually a bug in Django :), it does not escape form input in case of form.save(commit=False)

<!-- gh-comment-id:751477645 --> @ciur commented on GitHub (Dec 27, 2020): Fixed in 1.5.x branch. Fix is available as part of 1.5.5 release. This is actually a bug in Django :), it does not escape form input in case of ```form.save(commit=False)```
Author
Owner

@omemishra commented on GitHub (Dec 27, 2020):

Dear Ciur,

Thank you so much for your response , please let me know when it will be fixed so that i can recheck it again.

Regards
Ome

<!-- gh-comment-id:751494313 --> @omemishra commented on GitHub (Dec 27, 2020): Dear Ciur, Thank you so much for your response , please let me know when it will be fixed so that i can recheck it again. Regards Ome
Author
Owner

@omemishra commented on GitHub (Jan 4, 2021):

Dear Team,

Let me know if this vulnerability is fixed?

Regards
Ome

<!-- gh-comment-id:754005807 --> @omemishra commented on GitHub (Jan 4, 2021): Dear Team, Let me know if this vulnerability is fixed? Regards Ome
Author
Owner

@ciur commented on GitHub (Jan 4, 2021):

@omemishra, yes it is fixed in latest release (which is 1.5.5)

<!-- gh-comment-id:754066652 --> @ciur commented on GitHub (Jan 4, 2021): @omemishra, yes it is fixed in latest release (which is 1.5.5)
Author
Owner

@omemishra commented on GitHub (Jan 4, 2021):

Dear team,

Again i have found the xss

Steps:-

1. Open the following URL "https://demo.papermerge.com/admin/tags"
2. Click on important
3.  Now you can edit the name of tag.... enter the payload "Ome Mishra "><svg onmouseover=alert("XSS_By_OME")>"
4. Click on save
5. Now you will find that your xss will execute successfully.

Look like this is not yet fixed...

Regards
Ome
Tag_XSS

<!-- gh-comment-id:754093244 --> @omemishra commented on GitHub (Jan 4, 2021): Dear team, Again i have found the xss Steps:- 1. Open the following URL "https://demo.papermerge.com/admin/tags" 2. Click on important 3. Now you can edit the name of tag.... enter the payload "Ome Mishra "><svg onmouseover=alert("XSS_By_OME")>" 4. Click on save 5. Now you will find that your xss will execute successfully. Look like this is not yet fixed... Regards Ome ![Tag_XSS](https://user-images.githubusercontent.com/25466820/103559595-663d5800-4edc-11eb-8c67-ac9a62f2c101.png)
Author
Owner

@ciur commented on GitHub (Jan 6, 2021):

@omemishra, thanks for feedback!
Will be fixed!

<!-- gh-comment-id:755090554 --> @ciur commented on GitHub (Jan 6, 2021): @omemishra, thanks for feedback! Will be fixed!
Author
Owner

@omemishra commented on GitHub (Jan 6, 2021):

Hello Team,

Thanks for your response.

Let me know when it will be fixed.

Regards
Ome

<!-- gh-comment-id:755103858 --> @omemishra commented on GitHub (Jan 6, 2021): Hello Team, Thanks for your response. Let me know when it will be fixed. Regards Ome
Author
Owner

@ciur commented on GitHub (Feb 2, 2021):

@omemishra, fixed. You can check it directly on https://demo.papermerge.com
Credentials are guest/password77a (they are public, as guest account is used for public demo)

<!-- gh-comment-id:771486905 --> @ciur commented on GitHub (Feb 2, 2021): @omemishra, fixed. You can check it directly on https://demo.papermerge.com Credentials are guest/password77a (they are public, as guest account is used for public demo)
Author
Owner

@omemishra commented on GitHub (Feb 2, 2021):

Dear @ciur,

thanks for your response i have found more XSS on this application hope there is any bug bounty. hahaha

link:-
https://demo.papermerge.com/document/26/
in images metadata add "Ome Mishra "><svg onmouseover=alert("XSS_By_OME")>" and you will see the XSS payload executed successfully

link 2 :
https://demo.papermerge.com/
in folder metadata add "Ome Mishra "><svg onmouseover=alert("XSS_By_OME")>" and you will see the XSS payload executed successfully

Also please add client side validation as well because self xss is there on previously reported place.

Regards
Ome

<!-- gh-comment-id:771878964 --> @omemishra commented on GitHub (Feb 2, 2021): Dear @ciur, thanks for your response i have found more XSS on this application hope there is any bug bounty. hahaha link:- https://demo.papermerge.com/document/26/ in images metadata add "Ome Mishra "><svg onmouseover=alert("XSS_By_OME")>" and you will see the XSS payload executed successfully link 2 : https://demo.papermerge.com/ in folder metadata add "Ome Mishra "><svg onmouseover=alert("XSS_By_OME")>" and you will see the XSS payload executed successfully Also please add client side validation as well because self xss is there on previously reported place. Regards Ome
Author
Owner

@ciur commented on GitHub (Feb 3, 2021):

@omemishra, at this point there are no bug bounties. The best thing I can do at this moment is to add you to contributors list as security auditor.

I fixed XSS issue for metadata. Demo page features latest code updates (of the master branch).

Thank you for your great help!

<!-- gh-comment-id:772669412 --> @ciur commented on GitHub (Feb 3, 2021): @omemishra, at this point there are no bug bounties. The best thing I can do at this moment is to add you to [contributors list](https://github.com/ciur/papermerge/blob/master/CONTRIBUTORS.md) as security auditor. I [fixed XSS](https://github.com/papermerge/papermerge-core/commit/25a5c66ba9808d446e8d0f07064656a6b7f2afca) issue for metadata. [Demo page](https://demo.papermerge.com) features latest code updates (of the master branch). Thank you for your great help!
Author
Owner

@omemishra commented on GitHub (Feb 6, 2021):

Dear Ciur,

Thanks for adding me in contributor list.
We can test your whole website like VAPT, Please share your email if you want a proper VAPT.

Thanks & Regards
Ome

<!-- gh-comment-id:774409779 --> @omemishra commented on GitHub (Feb 6, 2021): Dear Ciur, Thanks for adding me in contributor list. We can test your whole website like VAPT, Please share your email if you want a proper VAPT. Thanks & Regards Ome
Sign in to join this conversation.
No milestone
No project
No assignees
1 participant
Notifications
Due date
The due date is invalid or out of range. Please use the format "yyyy-mm-dd".

No due date set.

Dependencies

No dependencies set.

Reference
starred/papermerge#219
No description provided.