Advisory ID: SYSS-2020-017 Product: ANTON Web Application Manufacturer: solocode GmbH Affected Version(s): 1.3.5 Tested Version(s): 1.3.5 Vulnerability Type: Cross-Site Scripting (CWE-79) Risk Level: Medium Solution Status: Close Manufacturer Notification: 2020-04-21 Solution Date: 2020-04-27 Public Disclosure: 2020-06-02 CVE Reference: Not yet assigned Author of Advisory: Joachim Klein, SySS GmbH ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Overview: ANTON is a universal learning platform for school and pupils. The manufacturer describes the product as follows (see [1]): "ANTON ist eine universelle Lern‐Plattform (Web & Mobile) für Schule und Schüler/innen, die sowohl zum eigenständigen Selbstlernen als auch zum interaktiven Lernen im Klassenraum‐Kontext eingesetzt werden kann." ANTON is vulnerable to cross-site scripting. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Vulnerability Details: Cross-site scripting (XSS) as a typical web application vulnerability describes the possibility to inject and execute JavaScript code in the application. Due to insufficient filtering of user-controlled input, ANTON is vulnerable to cross-site scripting. If an attacker succeeds, he/she has all options for action via JavaScript. For example, this includes the possibility to redirect to another website, take over the session (session hijacking) or change the original layout (defacements). ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Proof of Concept (PoC): As a proof of concept, SySS GmbH placed JavaScript code within the parameter "Nachname" inside an HTML tag by the command 'onerror'. For example, it was possible to extract the value of the local storage with the userLogId. " ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Solution: The issue was rectified by the vendor. All users automatically use the fixed version. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Disclosure Timeline: 2020-04-16: Vulnerability discovered 2020-04-21: Vulnerability reported to manufacturer 2020-04-27: Patch released by manufacturer 2020-06-02: Public disclosure of vulnerability ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ References: [1] Product website for ANTON https://anton.app/de/impressum/ [2] SySS Security Advisory SYSS-2020-017 https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2020-017.txt [3] SySS Responsible Disclosure Policy https://www.syss.de/en/news/responsible-disclosure-policy/ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Credits: This security vulnerability was found by Joachim Klein of SySS GmbH. E-Mail: joachim.klein@syss.de Public Key: https://www.syss.de/fileadmin/dokumente/PGPKeys/Joachim_Klein.asc Key ID: 0x535D9C315D2E0BBF Key Fingerprint: 3384 5485 D2E3 B20A F309 E66D 535D 9C31 5D2E 0BBF ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Disclaimer: The information provided in this security advisory is provided "as is" and without warranty of any kind. Details of this security advisory may be updated in order to provide as accurate information as possible. The latest version of this security advisory is available on the SySS website. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Copyright: Creative Commons - Attribution (by) - Version 3.0 URL: http://creativecommons.org/licenses/by/3.0/deed.en