# Exploit Title: ThingsBoard 3.3.1 'description' - Stored Cross-Site Scripting (XSS)# Date: 03/08/2022# Exploit Author: Steffen Langenfeld & Sebastian Biehler# Vendor Homepage: https://thingsboard.io/# Software Link: https://github.com/thingsboard/thingsboard/releases/tag/v3.3.1# Version: 3.3.1# Tested on: [relevant os]# CVE : CVE-2021-42751# Tested on: Linux#Proof-Of-Concept:
When creating a rule node (any) and putting a script payload inside the description of the rule node, it is executed upon hovering above the node within the editor.#Steps
1. Create a new rule node (via the menu "Rule chains")
2. Put a javascript payload within the description e.g <script>alert('XSS')</script>
3. Save the node
4. Upon hovering above the node within the editor the payload is executed