Overview
In ArangoDB, versions v2.2.6.2 through v3.7.10 are vulnerable to Cross-Site Scripting (XSS), since there is no validation of the .zip file name and filtering of potential abusive characters which zip files can be named to. There is no X-Frame-Options Header set, which makes it more susceptible for leveraging self XSS by attackers.
Details
The module ‘ArangoDB’ can be abused via file upload XSS vulnerability since there is no validation of the .zip file name and filtering of potential abusive characters which zip file can be named to. There is no X-Frame-Options Header set, which makes it more susceptible for leveraging self XSS by attackers.
PoC Details
Login to the application, and go to Services, Add service, Upload. Now select a .zip file named as an XSS tag, example given below. A pop-up indicating the successful execution of the script will now be presented.
PoC Code
><img src=x onerror=alert(document.domain)>.zip
Affected Environments
v2.2.6.2-v3.7.10
Prevention
Upgrade to v3.7.1