<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Data-Flows — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/data-flows/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 03 Jul 2024 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/data-flows/feed.xml" rel="self" type="application/rss+xml"/><item><title>netbox-data-flows Stored XSS Vulnerability in ObjectAlias Names</title><link>https://feed.craftedsignal.io/briefs/2024-07-netbox-data-flows-xss/</link><pubDate>Wed, 03 Jul 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-07-netbox-data-flows-xss/</guid><description>The netbox-data-flows plugin is vulnerable to stored cross-site scripting (XSS). An authenticated user with permissions to create or edit ObjectAlias objects can inject arbitrary HTML/JavaScript into the alias name. This payload is then rendered unescaped in DataFlow table views, leading to XSS when another user views the affected page. Successful exploitation can result in session theft, privileged action execution, and data exfiltration.</description><content:encoded><![CDATA[<p>The <code>netbox-data-flows</code> plugin for NetBox is susceptible to a stored cross-site scripting (XSS) vulnerability (&lt;=1.5.0). An attacker with authenticated access to create or modify <code>ObjectAlias</code> objects can inject malicious HTML/JavaScript code into the <code>name</code> field of an alias. This injected code is then rendered without proper sanitization within the <code>DataFlow</code> table views. When another user, particularly one with elevated privileges, views a <code>DataFlow</code> that includes the malicious alias, the injected script executes within their browser session. This can lead to session hijacking, unauthorized actions performed on behalf of the victim user, and the potential exfiltration of sensitive data from the NetBox instance. This vulnerability impacts any page rendering <code>DataFlowTable</code>, including the main Data Flow list page and model tabs that reuse <code>DataFlowTable</code>.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker logs into NetBox with valid credentials and permissions to create/edit <code>ObjectAlias</code> objects.</li>
<li>Attacker creates a new <code>ObjectAlias</code> object.</li>
<li>Within the <code>name</code> field of the <code>ObjectAlias</code>, the attacker injects a malicious JavaScript payload such as <code>&lt;img src=x onerror=alert(document.domain)&gt;</code>.</li>
<li>Attacker creates or edits a <code>DataFlow</code> object.</li>
<li>The attacker associates the malicious <code>ObjectAlias</code> with either the <code>sources</code> or <code>destinations</code> field of the <code>DataFlow</code> object.</li>
<li>The victim user logs into NetBox and navigates to the Data Flow list page or any page rendering the <code>DataFlowTable</code>.</li>
<li>The <code>DataFlowTable</code> attempts to render the <code>sources</code> or <code>destinations</code> which contains the malicious <code>ObjectAlias</code>. The <code>object_list_to_string()</code> function in <code>netbox_data_flows/utils/helpers.py</code> generates HTML using the unescaped <code>ObjectAlias.name</code> field.</li>
<li>The injected JavaScript within the <code>ObjectAlias.name</code> executes in the victim&rsquo;s browser, potentially leading to session theft or unauthorized actions.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>This stored XSS vulnerability in <code>netbox-data-flows</code> can affect any authenticated NetBox user who views a page rendering the affected <code>DataFlow</code> table. The impact is amplified when higher-privileged users are targeted. Successful exploitation allows an attacker to steal user sessions, perform privileged actions on behalf of the victim, and exfiltrate sensitive data accessible within NetBox. The vulnerability affects versions 1.5.0 and earlier of the <code>netbox-data-flows</code> plugin.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the <code>netbox-data-flows</code> plugin to a version greater than 1.5.0 to remediate the vulnerability (Affected Packages).</li>
<li>Deploy the Sigma rule &ldquo;Detect netbox-data-flows XSS Payload in ObjectAlias Name&rdquo; to detect attempts to create <code>ObjectAlias</code> objects with malicious payloads in the <code>name</code> field (rules).</li>
<li>Monitor NetBox logs for suspicious activity related to <code>ObjectAlias</code> creation and modification (logsource).</li>
<li>Review existing <code>ObjectAlias</code> objects for any potentially malicious code in the <code>name</code> field (ObjectAlias.name).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>xss</category><category>netbox</category><category>data-flows</category><category>stored-xss</category></item></channel></rss>