REDCap: Multiple Cross-Site Scripting (XSS) Vulnerabilities
范德比尔特大学开发的REDCap是一款用于研究数据收集的安全平台。研究人员发现该平台旧版本存在三处存储型跨站脚本(XSS)漏洞,可被利用执行恶意代码并泄露敏感数据。受影响区域包括消息、项目标题和工具名称。已发布补丁版本15.0.27 LTS和15.4.3 Standard以修复问题,建议用户立即更新以降低风险。 2025-9-26 16:48:31 Author: www.trustwave.com(查看原文) 阅读量:14 收藏

REDCap, developed by Vanderbilt University, is a secure platform designed for data collection in research studies and operations.

REDCap is popular within scientific institutions and universities that require strict compliance with government regulations and data privacy laws when conducting data collection for research purposes. It is particularly useful for managing studies that often contain sensitive or private information.

As a researcher for Trustwave SpiderLabs, a LevelBlue Company, I identified three instances of a stored cross-site scripting (XSS) vulnerability in the REDCap application. When exploited, these vulnerabilities could allow attackers to execute malicious JavaScript code in victims' browsers, potentially compromising sensitive data.

The Vulnerabilities:

The REDCap applications older than version 15.0.27 LTS are vulnerable to XSS caused by failure to correctly encode untrusted data. Although the application has implemented security features to prevent XSS attacks, such as removing HTML event attributes, I was still able to identify an XSS payload that bypassed the security features.

The following locations were affected:

  • REDCap Message
  • Project Title
  • Instrument Name

Although the REDCap session cookie was found to have the 'HttpOnly' attribute set during testing, the identified vulnerabilities could still pose risks to users and their data.

Proof of Concept

Here is a sample Proof of Concept (PoC), which applies to the affected locations listed above.

  1. Ensure that you’re authenticated to the REDCap application as a standard application user.
  2. Navigate to the Messenger function by clicking the top navigation bar.
  3. Create a standard conversation.
  4. Send a message containing an XSS payload. For example:
    <a href="j&#x61vascript:alert(1)">Click Me</a>
  5. Observe that the payload is executed when clicking the "Click Me" link in the message.

This payload, when inserted into various fields within REDCap, creates clickable elements that execute the malicious JavaScript when clicked.

Remediation

The patched versions 15.0.27 LTS and 15.4.3 Standard were released on June 12, 2025. Trustwave strongly recommends that all REDCap users update to the latest version immediately.

CVE Assignment

This vulnerability went through the Trustwave Responsible Disclosure Program. Trustwave has applied for a CVE for this vulnerability as soon as the patched versions were released in June. However, delays with the CVE Program have delayed the CVE assignment. When a CVE is assigned to these vulnerabilities, we will update this post.


文章来源: https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/redcap-multiple-cross-site-scripting-xss-vulnerabilities/
如有侵权请联系:admin#unsafe.sh