Summary by Atlassian
A Stored XSS Vulnerability in Jira Service Management
A Stored XSS Vulnerability in Jira Service Management
A Non-Authenticated users can execute Stored XSS attack using the Widget Chat in Service Desk when Inserting malicious script in Question field , The script executes in Requests resolved area.
Jira Service Management Cloud (bugbounty-test-<bugcrowd-name>.atlassian.net)
Web App
Good Day:
Please allow me to report this Stored XSS in Jira Service Desk "Reports" Via "Requests resolved".
Where in Non-Authenticated users can execute a malicious script against Admin.
Step To Reproduce:
Step1. As admin enables the widget for your Service Desk. https://norwin1.atlassian.net/servicedesk/admin/TESF/addon/com.atlassian.servicedesk.embedded__settings
Set up the widget so that it will go live publicly.
Step2. when it is now live: a malicious user can execute an attack via asking a question with an xss payload norwin"><img src="x" onerror="alert(document.domain)"></img> putting it inWhat is your question field and send it.
Step3. Admin now received the question and mark it as resolved.
Now navigate tohttps://norwin1.atlassian.net/jira/servicedesk/projects/TESF/reports/kb-requests-resolved Reports then go to Request Resolved
now click the graph.
Step. XSS payload executed.
Thanks,
Norwin