We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Found a bug? Please fill out the sections below. 👍
In reNgine v1.0, there is Stored Cross-site Scripting vulnerability through Organization Name at All Targets page!
/target/list/organization
<img src=binit onerror="alert('XSSed by Binit at '+document.location+'!')">
/target/list/target
The text was updated successfully, but these errors were encountered:
0c17bb4
No branches or pull requests
Found a bug? Please fill out the sections below. 👍
Issue Summary
In reNgine v1.0, there is Stored Cross-site Scripting vulnerability through Organization Name at All Targets page!
Steps to Reproduce
/target/list/organization
endpoint.<img src=binit onerror="alert('XSSed by Binit at '+document.location+'!')">
in the Organization name field./target/list/target
, and you will see that the XSS payload gets executed.Technical details
The text was updated successfully, but these errors were encountered: