Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

There may be XSS hidden dangers here #379

Closed
RacerZ-fighting opened this issue Dec 27, 2022 · 2 comments
Closed

There may be XSS hidden dangers here #379

RacerZ-fighting opened this issue Dec 27, 2022 · 2 comments
Assignees

Comments

@RacerZ-fighting
Copy link

Github issue tracker is used for bug only.
For general questions and requests, please join the Google group

Don't hesitate to provide screenshots.

What is the version of Jorani?

v1.0

Expected behavior

Acronym is just a normal form parameter, but if I modify the length of that column in database, I can input a longer XSS payload
image

image

Actual behavior

And when next time I look at the page, a XSS vulnerability is pop out.
image

Steps to reproduce the behavior

Details can be seen in the following docx.
jorani.docx

@bbalet
Copy link
Owner

bbalet commented Apr 30, 2023

This "attack" is very unlikely to happen.
you need to access the db and then edit db column, but who would edit the lenght of acronym ???
And then you need to have admin privileges to exploit it

I will add a limit but no panic :)

@bbalet bbalet closed this as completed in 93634b7 May 1, 2023
@RacerZ-fighting
Copy link
Author

Jorani?

Thanks! I found it exploitable because there is already existed a SQL vuln(CVE-2022-34132), so maybe the attacker can use it to control the db column.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

2 participants