Stored XSS in Project Field at Share Settings Panel
Description
A vulnerability has been identified in the "Project" field when creating an external share for a project in Jira, where arbitrary JavaScript can be executed on other users' browsers if the project name includes an XSS payload.
Initially, a low-privilege user in Jira created a Team-Managed project with the following payload embedded in the project name:
Steps to Reproduce
-
Log in to Jira as a user with lower privileges.
-
Create a Team-Managed project and navigate to project settings > details.
-
Update the project name to
bugcrowd'"><h1>bugcrowd</h1><img src=x onerror=alert(document.domain)>. -
Log in as a Jira administrator.
-
Install the "External Share for Jira" app.
-
After installation, go to apps > external share.
-
Select create External share, choose board and search for
bugcrowd. -
Observe that the payload is executed whenever a user accesses the vulnerable page.
withdrawn due to a duplicate: