-
-
Notifications
You must be signed in to change notification settings - Fork 521
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
XSS vulnerability in creating Posts #331
Comments
Thank you for taking it up so quick. Similar vulnerabilities also exist while creating new tags and users. |
@C0deBr8kr Thank you for writing up such a neatly detailed Issue. Will look into this ASAP. |
Commit https://github.com/cnvs/easel/commit/db160d45e6746436829a202265323ef954f2032c addresses this issue. |
@reliq Re-opened with branch |
First off, thanks for taking the time to create the issue. Closing because everything v3.x related will remain as-is and won’t receive anymore updates. The next release is slated for this week, so stay tuned! |
Exploit Title: Stored XSS vulnerability possible in creating posts in canvas (v3.3.0)
Date: 22-April-2017
Exploit Author: @C0deBr8kr
Software Link: https://github.com/cnvs/canvas/archive/v3.3.0.zip
Version: 3.3.0
Description:
XSS allows an attacker to run arbitrary scripts on the users browser.
Exploit POC:
Browser used: Chrome version 57.0.2987.133
References:
https://www.owasp.org/index.php/Cross-site_Scripting_(XSS)
Screenshots:
Impact: An attacker can execute arbitrary script on an unsuspecting user's browser.
For instance - Since, there is no seperation between the posts created by a privileged and an unprivileged user, an unprivileged user can create a post with script to steal the administrator's cookies or perform an action on his behalf.
Mitigation: Input should be properly validated before storing in the database and output from the database should also be properly encoded before displaying it to the user.
The text was updated successfully, but these errors were encountered: