# Exploit Title: Relate Learning And Teaching system Version before 2024.1 Stored XSS
# Date: 18/04/2024
# Exploit Author: kai6u
# Vendor Homepage: https://github.com/inducer/
# Software Link: https://github.com/inducer/relate
# Version: 2024.1 (https://github.com/inducer/relate/commit/2fdbd4480a2d0a45c746639be244a61a0d4112b6)
# Tested on: Ubuntu 22.04
# CVE : CVE-2024-32405(Reserved)
Stored XSS is performed when the payload is stored and the results are referenced when the exam content is submitted.
1) First, Attacker answer question with below payload.
* Paylod: <script>alert(1)</script>
2) Next, Course Administrator or Instructor logged in and check answer of this student.( with Exam Analytics view)
* Access to quiz_start/inlinemultin url.
3) Executed Payload and Alert was popped up.
* An attacker can use this feature to force arbitrary requests via JavaScript on users who can view the results.