Softr v2.0 was discovered to contain a HTML injection vulnerability via
the Work Space Name parameter.

Musings of Ghojaria
1 min readFeb 3, 2023

--

There’s an HTML injection vulnerability present inside emails sent from slack when the Workspace name on the account contains HTML. The HTML is stored in the backend database and when emails are sent (promotional, etc), the HTML is sent along with the rest of the email.

Whenever the user is inviting a collaborator in the workspace, the script will get executed via email.

Steps to Reproduce :

Step 1: Navigate to https://studio.softr.io/dashboard
Step 2: Click on the + icon to add a new Workspace.
Step 3: In the Workspace Name, Add the below-mentioned payload.
“></svg>//[“‘` →<a href= “http://google.com">Click Me</a></div>
Step 4: You’ll get an option to invite the Collaborator to Workspace.
Step 5: Enter the email of the victims/any user and click on Add.
Step 6: Victim/User will receive an email, which will trigger the HTML Payload which we entered in the Workspace Name field.

Reference
http://softr.com
https://studio.softr.io/dashboard
https://www.softr.io/

Sign up to discover human stories that deepen your understanding of the world.

Free

Distraction-free reading. No ads.

Organize your knowledge with lists and highlights.

Tell your story. Find your audience.

Membership

Read member-only stories

Support writers you read most

Earn money for your writing

Listen to audio narrations

Read offline with the Medium app

--

--

No responses yet

Write a response