CoSpaces Vulnerability - Account Access Compromised Just By Clicking Play

This vulnerability allows you to:

  1. Execute any JavaScript code on the browser from just pressing the play button
  2. Log the user out of their account from just pressing the play button
  3. Redirect user to any site
  4. Possibly do operations (creating spaces, deleting spaces, changing spaces) without permission

This is slightly related to a file inclusion vulnerability. It is mainly an XSS vulnerability (Cross Site Scripting attack)

2 Likes

This is a time sensitive XSS vulnerability, please reply soon.
If you are a non staff member reading, flag this post to get staff attention.

Press Flag, then other, then put Vulnerability for the reason.

1 Like

Here’s some footage:


In one video the code looks very strange, I complicated it on purpose to keep the vulnerability confidential. But as you can see, the vulnerability manipulates HTML easily.

One video demonstrates being logged out too! It doesn’t need the screen either. It could do it instantly, but I did it to record it easier.

@CoSpaces_Edu Please pass on to developers.

1 Like

If they respond I can give the readable code to them and they can fix it. It’s pretty easy to do, just delete some files server side in order to prevent unauthorized access.

@CoSpaces_Edu XSS Vulnerability (Cross Site Scripting attack) found. Please check this out.

Update: CoSpaces support is working with me.
@techleapnz @CoSpaces_Edu

1 Like

Final Update & Solution:
CoSpaces has successfully patched the vulnerability by removing nonessential Brython runtime packages from the server.
Thanks for working with me!
@techleapnz @CoSpaces_Edu

1 Like

Awesome work, thanks @cahse. Please message @CoSpaces_Edu directly using this forum’s built-in messaging (or support@cospaces.io) if you find any further vulnerabilities, so that developers have a chance to patch the code before the vulnerability becomes public. :pray:

1 Like

Resource for others:

The vulnerability abuses the browser package that the developers forgot to delete. Whether it’s because they forgot or because they are not familiar with Brython is unknown.

How I found the vulnerability:

I wanted to see how the Python code was being executed, so I checked the Network Logs and found something called Brython. I looked further and found an open source Brython project that allows you to execute Python in a way that can design websites. CoSpaces remanipulated this project for their own purposes and injected a package within Brython.

I realized that the examples from their documentation work in CoSpaces… This is the moment I realized I found the vulnerability.

Brython website: Brython Documentation

1 Like