Impact
Reflected XSS exploit : Editing a request's payload can lead to malicious JS - local and remote - execution.
Patches
Systematic escaping of error messages when rendering on the page.
References
N°7514 - [SECU] Reflected XSS in the preferred language selection
N°7520 - [SECU] Cross Origin Resource Sharing using language selection
N°7519 - [SECU] CSS Injection using the preferred language selection
N°7518 - [SECU] HTML Injection using language selection
Impact
Reflected XSS exploit : Editing a request's payload can lead to malicious JS - local and remote - execution.
Patches
Systematic escaping of error messages when rendering on the page.
References
N°7514 - [SECU] Reflected XSS in the preferred language selection
N°7520 - [SECU] Cross Origin Resource Sharing using language selection
N°7519 - [SECU] CSS Injection using the preferred language selection
N°7518 - [SECU] HTML Injection using language selection