//line 421functiongetchanbyplat($platform)
{
$userid=$this->common->getUserId();
$sql="select * from ".$this->db->dbprefix('channel')." where active=1 and platform='$platform' and type='system' union select * from ".$this->db->dbprefix('channel')." where active=1 and platform='$platform' and type='user'and user_id=$userid";
$query = $this->db->query($sql);
if ($query!=null&&$query->num_rows()>0) {
return$query->result_array();
}
returnnull;
}
We can see that the $platform variable is used inside the the sql query without sanitization.
So the attacker can use the UNION command inside the platform to join a harmful input to the results of the query.
For example: $platform = 'something' UNION select '<script>alert(document.cookie)<\script>' AS '.
Thus the XSS will happen at echo json_encode($channel);
I recommend to have a check and delete for the character (') in the platform variable.
The text was updated successfully, but these errors were encountered:
Hello,
I would like to report for XSS vulnerability.
In file https://github.com/cobub/razor/blob/2c991aff4a9c83f99e77a03e26056715706f15c0/web/application/controllers/manage/product.php
In file
razor/web/application/models/channelmodel.php
Line 421 in 2c991af
We can see that the $platform variable is used inside the the sql query without sanitization.
So the attacker can use the UNION command inside the platform to join a harmful input to the results of the query.
For example: $platform = 'something' UNION select '<script>alert(document.cookie)<\script>' AS '.
Thus the XSS will happen at
echo json_encode($channel);I recommend to have a check and delete for the character (') in the platform variable.
The text was updated successfully, but these errors were encountered: