Skip to content
This repository was archived by the owner on Jan 27, 2023. It is now read-only.

XSS vulnerability in display.php #138

Open
everping opened this issue Apr 17, 2019 · 2 comments
Open

XSS vulnerability in display.php #138

everping opened this issue Apr 17, 2019 · 2 comments
Assignees
Labels

Comments

@everping
Copy link

everping commented Apr 17, 2019

Summary

The parameter project is not sanitized, so attackers can poison this parameter and then create a reflected XSS attack.

PoC

http://domain.tld/display.php?browse[]=all&project=1">test</a><script>alert(123)</script>&select=desk&_=1555500329996

Details

The flaw exists since $project was assigned to a GET parameter without sanitizing

$project = $_GET['project'];

then, $project was printed without escaping

print '<a href="rss.php?project=' . $project . '" target="_blank" id="rss-link">&nbsp;<i class="fa fa-rss"></i> Project RSS</a>';

@mkucej
Copy link
Owner

mkucej commented Apr 17, 2019

Thank you. This will be fixed in the next version.

@mkucej mkucej self-assigned this Apr 17, 2019
@mkucej mkucej added the bug label Apr 17, 2019
@everping
Copy link
Author

@mkucej Can you assign this flaw a CVE?

Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
Projects
None yet
Development

No branches or pull requests

2 participants