Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

XSS in team name field #592

Closed
yunolikeme opened this issue Mar 21, 2018 · 2 comments
Closed

XSS in team name field #592

yunolikeme opened this issue Mar 21, 2018 · 2 comments

Comments

@yunolikeme
Copy link

I noticed that there are a few reports of XSS and you don't seem to believe that XSS from a privileged user is a problem. I have found an XSS where a user can target an admin user.

If someone makes a team name with a script, when an admin user tries to delete the team, the script will execute in the popup window. Case in point, iframe in the demo environment.

ctfdxss

@ColdHeat
Copy link
Member

Okay this is a reasonable issue.

XSS from a privileged user to a privileged user is not a problem because there is no escalation.

ColdHeat added a commit that referenced this issue Mar 21, 2018
ColdHeat added a commit that referenced this issue Mar 21, 2018
ColdHeat added a commit that referenced this issue Apr 16, 2018
* Chals endpoint seperation (#572)

* Separate the logic of ctftime and email confirmations and admin checking into decorators
* Separate the chals endpoint into /chals and /chals/:id. Closes #552, #435.
* Challenges are now loaded directly from the server before being displayed to the user. 
* Challenge modals now use `{{ description }}` instead of `{{ desc }}`.
* 403 is now a more common status code and can indicate that a CTF has not begun or that you are not logged in. This is in addition to CSRF failures. 
* Update tests to new behavior

* Fixing glitch if an entry chal or team id isn't defined

* Markdown it (#574)

* Replace Marked with Markdown-It

* Update modal change (#576)

* Switch update modals to use nunjucks instead of JS to load in data. 
* Fix previewing challenges after hitting the challenge update button.
* Fix edit-files issue with an unnecessary request.

* Fix solves button

* Closes #592
@20esaua
Copy link

20esaua commented May 21, 2019

@ColdHeat I know this issue is old, but this comment is not responding to this issue. I disagree with your assertion regarding XSS without escalation. Although self XSS is of significantly lower severity than remotely-exploitable reflected/stored XSS vulns, it is an easy fix and should be fixed. Otherwise, it is possible for the vuln could be chained with another vuln and used in a practical attack. XSS is an easy fix 99% of the time, so it's almost always worth the effort to go ahead and fix it even though a practical attack may not seem apparent.

Edit: This comment would probably be more appropriate on this issue, sorry: #905 (comment)

@CTFd CTFd locked as resolved and limited conversation to collaborators May 22, 2019
JJwang11 pushed a commit to sigpwny/CTFd that referenced this issue Jan 22, 2020
JJwang11 pushed a commit to sigpwny/CTFd that referenced this issue Jan 22, 2020
* Chals endpoint seperation (CTFd#572)

* Separate the logic of ctftime and email confirmations and admin checking into decorators
* Separate the chals endpoint into /chals and /chals/:id. Closes CTFd#552, CTFd#435.
* Challenges are now loaded directly from the server before being displayed to the user. 
* Challenge modals now use `{{ description }}` instead of `{{ desc }}`.
* 403 is now a more common status code and can indicate that a CTF has not begun or that you are not logged in. This is in addition to CSRF failures. 
* Update tests to new behavior

* Fixing glitch if an entry chal or team id isn't defined

* Markdown it (CTFd#574)

* Replace Marked with Markdown-It

* Update modal change (CTFd#576)

* Switch update modals to use nunjucks instead of JS to load in data. 
* Fix previewing challenges after hitting the challenge update button.
* Fix edit-files issue with an unnecessary request.

* Fix solves button

* Closes CTFd#592
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
None yet
Projects
None yet
Development

No branches or pull requests

3 participants