Description
An endpoint(/api/upload) on the admin panel can be accessed without any form of authentication. This endpoint accepts an HTTP POST to upload a file which is then stored on the node and is available via URL. This can lead to a stored cross site scripting attack if the file uploaded contains malicious code and is then accessed and executed within the context of the user's browser.
This function is no longer necessary as the ziti-console moves from a node server application to a single page application, and has been disabled.
Version 3.7.1 has been released with the patches. Any user using the ziti-console, particularly if open to other users, should upgrade the ziti-console as soon as possible.
The OpenZiti project would like to thank DIABL0-SEC for reporting this issue and detailed information, enabling it to be resolved quickly.