Description
OpenCTI 3.3.1 is vulnerable to a reflected cross-site scripting (XSS) attack via the /graphql endpoint. An attacker can inject arbitrary JavaScript code by sending a crafted GET request with a malicious payload in the query string, leading to execution of JavaScript in the victim's browser. For example, a request to /graphql?'"--></style></scRipt><scRipt>alert('Raif_Berkay')</scRipt> will trigger an alert. This vulnerability was discovered by Raif Berkay Dincel and confirmed on Linux Mint and Windows 10.
Problem types
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Product status
Credits
Raif Berkay Dincel
References
www.exploit-db.com/exploits/48595 (ExploitDB-48595)
www.opencti.io/ (OpenCTI Official Homepage)
github.com/OpenCTI-Platform/opencti (OpenCTI GitHub Repository)
www.vulncheck.com/advisories/opencti-cross-site-scripting (VulnCheck Advisory: OpenCTI 3.3.1 - Cross Site Scripting)