Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

There is XSS vulnerability that can be able to obtain sensitive user information in the foreground #457

Closed
NKingpp opened this issue Apr 12, 2022 · 1 comment

Comments

@NKingpp
Copy link

NKingpp commented Apr 12, 2022

Reproduction process
1.Log in to the back office,Click on the background navigation function.
image
2.Click the Add Navigation button,Insert xss payload in the header,As shown below.
image
3.Then click save and go back to the front page of the cms to trigger the xss vulnerability.
image
Restoration suggestions
1.Backend filters input for pointed brackets.
2.Frontend uses html entity coding output.

@SeriaWei
Copy link
Owner

Thanks for the feedback, we will fix it in the next release.

SeriaWei added a commit that referenced this issue Apr 14, 2022
@SeriaWei SeriaWei closed this as completed May 2, 2022
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants