Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

New plugins/fireHook route vulnerable to xss #533

Closed
draco2003 opened this issue Nov 22, 2013 · 3 comments
Closed

New plugins/fireHook route vulnerable to xss #533

draco2003 opened this issue Nov 22, 2013 · 3 comments
Milestone

Comments

@draco2003
Copy link
Contributor

http://localhost:4567/plugins/fireHook?hook=server.create_routes&args=%3Cscript%3Ealert('yoyoyo');%3C/script%3E

Chrome and safari block it by default , but not sure if IE, firefox, etc.. will.

(let me know if there is a better way to submit security related issues.)

@julianlam
Copy link
Member

Thank you @draco2003 for catching this one!

There is a possibility that HTML should be passed back and forth, but because there are no cases of it right now, better be safe rather than sorry. From now on, any requests to GET /fireHook containing a string argument (or returning a string argument) will be sanitized.

@katanacrimson
Copy link
Contributor

He has a subtle point here however - there's a need for a responsible reporting venue for security related issues. Maybe something for another issue, but that's definitely something that should be considered for project development infrastructure.

@julianlam
Copy link
Member

Agreed -- in the meantime, emailing one of the maintainers (myself, @psychobunny, or @barisusakli) will be sufficient.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

3 participants