# Exploit Title: ThingsBoard 3.3.1 'description' - Stored Cross-Site Scripting (XSS) # Date: 03/08/2022 # Exploit Author: Steffen Langenfeld & Sebastian Biehler # Vendor Homepage: https://thingsboard.io/ # Software Link: https://github.com/thingsboard/thingsboard/releases/tag/v3.3.1 # Version: 3.3.1 # Tested on: [relevant os] # CVE : CVE-2021-42751 # Tested on: Linux #Proof-Of-Concept: When creating a rule node (any) and putting a script payload inside the description of the rule node, it is executed upon hovering above the node within the editor. #Steps 1. Create a new rule node (via the menu "Rule chains") 2. Put a javascript payload within the description e.g 3. Save the node 4. Upon hovering above the node within the editor the payload is executed