Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2020-27358 PoC — REDCap 授权问题漏洞

Source
Associated Vulnerability
Title:REDCap 授权问题漏洞 (CVE-2020-27358)
Description:An issue was discovered in REDCap 8.11.6 through 9.x before 10. The messenger's CSV feature (that allows users to export their conversation threads as CSV) allows non-privileged users to export one another's conversation threads by changing the thread_id parameter in the request to the endpoint Messenger/messenger_download_csv.php?title=Hey&thread_id={THREAD_ID}.
Description
CVE-2020-27358 and CVE-2020-27359
Readme
# CVE-2020-27358 / CVE-2020-27359

Exploitation steps for **CVE-2020-27358 and CVE-2020-27359**


## CVE-2020-27358 

An issue was discovered in REDCap 8.11.6 through 9.x before 10. The messenger's CSV feature (that allows users to export their conversation threads as CSV) allows non-privileged users to export one another's conversation threads by changing the thread_id parameter in the request to the endpoint Messenger/messenger_download_csv.php?title=Hey&thread_id={THREAD_ID}. 

#### Testing Steps 
1. Login as any user. 
2. Navaigate to a existing message thread.
3. Click option the export as CSV.
4. Intercept the request and change the thread_id paramter to any valid thread ID.



## CVE-2020-27359 

A cross-site scripting (XSS) issue in REDCap 8.11.6 through 9.x before 10 allows attackers to inject arbitrary JavaScript or HTML in the Messenger feature. It was found that the filename of the image or file attached in a message could be used to perform this XSS attack. A user could craft a message and send it to anyone on the platform including admins. The XSS payload would execute on the other account without interaction from the user on several pages. 

#### Testing Steps 
1. Login as any user. 
2. Navaigate to a existing message thread.
3. Click add an image and upload an image.
4. Intercept the request and change filename to `\"><svg/onload=alert(document.domain)>`
5. Send the message.

You can send the XSS payload to any user on the platform and it will execute without interaction. 
File Snapshot

[4.0K] /data/pocs/6de46b4c9e70006cae80acbc5e8d739da69edfc0 ├── [1.0K] LICENSE └── [1.5K] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →