You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
In the latest version of reNgine (v1.0), there is Stored Cross-site Scripting vulnerability at two places (Todo Title and Recon Todo/Note) at /recon_note/list_note.
Steps to Reproduce
Visit your instance of reNgine, login to it, and then visit /recon_note/list_note.
Click on "New Task" and write <img src=binit onerror="alert('XSSed by Binit at '+document.location)"> in Todo Title and Recon Todo/Note fields.
Click on the "Add Task" button, and when the task is added, you should now see our JavaScript getting executed.
To verify whether it is stored or not, visit the endpoint again, and you will see that the payload is again executed.
I have confirmed that this issue can be reproduced as described on a latest version/pull of reNgine: yes
Technical details
Debian 4.19.181-1
The text was updated successfully, but these errors were encountered:
Issue Summary
In the latest version of reNgine (v1.0), there is Stored Cross-site Scripting vulnerability at two places (Todo Title and Recon Todo/Note) at
/recon_note/list_note
.Steps to Reproduce
/recon_note/list_note
.<img src=binit onerror="alert('XSSed by Binit at '+document.location)">
in Todo Title and Recon Todo/Note fields.To verify whether it is stored or not, visit the endpoint again, and you will see that the payload is again executed.
Technical details
The text was updated successfully, but these errors were encountered: