Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

一些安全建议,建议隐藏 #1769

Closed
jhhua opened this issue Mar 24, 2022 · 1 comment
Closed

一些安全建议,建议隐藏 #1769

jhhua opened this issue Mar 24, 2022 · 1 comment

Comments

@jhhua
Copy link

jhhua commented Mar 24, 2022

What is version of Halo has the issue?

1.5.0

What database are you using?

Other

What is your deployment method?

Fat Jar

Your site address.

No response

What happened?

作者你好,在部署环境的过程中,发现了一些问题。
希望在下一个版本中,能够进行一些安全的升级。
如下:
导出的文件未加密,可以修改内容,安全隐患:
用户将博客备份开源到互联网,遭到修改,可能导致存储型xss

图片

图片
图片

json-data 未加密
位置:blog_footer_info 可导致,其他位置也一样

效果如下:

图片

修复建议:
对备份内容进行加密。。。

同样的xss,也可以在该位置得到证实
http://localhost:8090\admin\index.html#/system/tools

图片

图片

Relevant log output

No response

Additional information

English report:

·Description
Stored Cross-site scripting (XSS) vulnerability in halo before 1.5.0 allows remote attackers to inject arbitrary web script or HTML via the halo-1.5.0/admin to index.html#/system/options.
resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Administer permission

·Discovery process
Cross Site Scripting (XSS) vulnerability in halo-1.5.0 via
the <textarea> label to

  1. halo-1.5.0\admin\index.html#/system/options ,
    the The Database Backup feature to

  2. halo-1.5.0\admin\index.html#/system/tools

Setting website page in :
http://localhost:8090\admin\index.html#/system/tools
图片

when i clicked label,the options will be save...
http://localhost:8090/s/about allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the <textarea> label

图片

stored cross-site scripting (XSS) vulnerability in The Database Backup feature.
图片
图片
when i clicked

label,the json-data will be exported.
图片

this json-data allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into after the "key":"blog_footer_info","value": option

图片
if someone import this json-data.
this payload will be executed
图片

图片

@jhhua
Copy link
Author

jhhua commented Mar 24, 2022

What is version of Halo has the issue?

1.5.0

What database are you using?

Other

What is your deployment method?

Fat Jar

Your site address.

No response

What happened?

作者你好,在部署环境的过程中,发现了一些问题。 希望在下一个版本中,能够进行一些安全的升级。 如下: 导出的文件未加密,可以修改内容,安全隐患: 用户将博客备份开源到互联网,遭到修改,可能导致存储型xss

图片

图片 图片

json-data 未加密 位置:blog_footer_info 可导致,其他位置也一样

效果如下:

图片

修复建议: 对备份内容进行加密。。。

同样的xss,也可以在该位置得到证实 http://localhost:8090\admin\index.html#/system/tools

图片

图片

Relevant log output

No response

Additional information

English report:

·Description Stored Cross-site scripting (XSS) vulnerability in halo before 1.5.0 allows remote attackers to inject arbitrary web script or HTML via the halo-1.5.0/admin to index.html#/system/options. resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Administer permission

·Discovery process Cross Site Scripting (XSS) vulnerability in halo-1.5.0 via the <textarea> label to

1. halo-1.5.0\admin\index.html#/system/options  ,
   the The Database Backup feature to

2. halo-1.5.0\admin\index.html#/system/tools

Setting website page in : http://localhost:8090\admin\index.html#/system/tools 图片

when i clicked label,the options will be save... http://localhost:8090/s/about allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the <textarea> label

图片

stored cross-site scripting (XSS) vulnerability in The Database Backup feature. 图片 图片 when i clicked
label,the json-data will be exported.
图片

this json-data allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into after the "key":"blog_footer_info","value": option

图片 if someone import this json-data. this payload will be executed 图片

图片

@jhhua jhhua closed this as completed Mar 24, 2022
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant