In one video the code looks very strange, I complicated it on purpose to keep the vulnerability confidential. But as you can see, the vulnerability manipulates HTML easily.
One video demonstrates being logged out too! It doesn’t need the screen either. It could do it instantly, but I did it to record it easier.
If they respond I can give the readable code to them and they can fix it. It’s pretty easy to do, just delete some files server side in order to prevent unauthorized access.
Final Update & Solution:
CoSpaces has successfully patched the vulnerability by removing nonessential Brython runtime packages from the server.
Thanks for working with me! @techleapnz@CoSpaces_Edu
Awesome work, thanks @cahse. Please message @CoSpaces_Edu directly using this forum’s built-in messaging (or support@cospaces.io) if you find any further vulnerabilities, so that developers have a chance to patch the code before the vulnerability becomes public.
The vulnerability abuses the browser package that the developers forgot to delete. Whether it’s because they forgot or because they are not familiar with Brython is unknown.
How I found the vulnerability:
I wanted to see how the Python code was being executed, so I checked the Network Logs and found something called Brython. I looked further and found an open source Brython project that allows you to execute Python in a way that can design websites. CoSpaces remanipulated this project for their own purposes and injected a package within Brython.
I realized that the examples from their documentation work in CoSpaces… This is the moment I realized I found the vulnerability.