# Exploit Title: Codiad - Stored (Persistent) Cross Site Scripting Vulnerability
# Date: 02/12/2013
# Exploit Author: Project Zero Labs
# Vendor Homepage: http://www.codiad.com
# Software Link: https://github.com/Codiad/Codiad
# Version: v.2.0.7
# Tested on: Kali Linux / Iceweasel v.22
About the software:
===================
Codiad is a web-based IDE framework with a small footprint and minimal requirements.
Demo: http://demo.codiad.com/
Vulnerability Details:
======================
Project Zero Labs identified a stored (persistent) cross site scripting vulnerability in the
"Project Name" field. For example if we put: <script>alert("XSS Found!");</script>
as the project name a popup alert will appear every time we trigger the Project Menu or
the Codiad loads the Project.
An attacker can inject malicious code that will be executed on the victim's browser.
The vulnerability has already reported to the development team via GitHub.
Report & Proof Of Concept:
==========================
A detailed report with screenshots as Proof Of Concept can be found in the software's bug tracker (Github):
https://github.com/Codiad/Codiad/issues/584
Payload:
========
<script>alert("XSS Found!");</script>
Severity:
=========
Medium
Credits:
========
Project Zero Labs
labs@projectzero.gr
http://www.projectzero.gr