Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Cross-site Scripting (XSS) in bigtreecms 4.2.18 #290

xfkxfk opened this issue Jun 5, 2017 · 2 comments


None yet
2 participants
Copy link

commented Jun 5, 2017

Multiple Security Issue of XSS exists in BigTree CMS Less than 4.2.18


// Read the manifest
$json = json_decode(file_get_contents($cache_root."manifest.json"),true);
	<?=$json["title"]?> <?=$json["version"]?>
	<small>by <?=$json["author"]["name"]?></small>

title、version、author_name not filter by htmlspecialchars() function

in url:
upload,there is manifest.json in

    "type": "extension",
    "id": "xfkxfk",
    "version": "",
    "revision": 1,
    "compatibility": "xfkxfk",
    "title": "xfkxfk<img src =1 onerror=alert(/xss/)>",
    "description": "",

when upload successful, result in a xss vuln
(you can also build-extensions, then download extensions, final modify extension and install it)


other file exists xss vuln too,for example:

please use htmlspecialchars() function to filter all params~

thank you~
email :

timbuckingham added a commit that referenced this issue Jun 5, 2017


This comment has been minimized.

Copy link

commented Jun 5, 2017

I wouldn't consider this XSS as there's no other site involved (and hence it can't be executed without the user uploading a malicious package). I have setup those fields to be escaped, though!


This comment has been minimized.

Copy link

commented Jun 5, 2017

If you install a package or extension containing malicious content, then you will be xssed, so you have to filter the fields you need to display, Rather than displayed directly.
for example:

	<?=htmlspecialchars($json["title"])?> <?=htmlspecialchars($json["version"])?>
	<small>by <?=htmlspecialchars($json["author"]["name"])?></small>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
You can’t perform that action at this time.