Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Possible XSS vulnerability #57

Closed
enferas opened this issue Nov 14, 2021 · 3 comments
Closed

Possible XSS vulnerability #57

enferas opened this issue Nov 14, 2021 · 3 comments

Comments

@enferas
Copy link

enferas commented Nov 14, 2021

Hello,

I would like to report for XSS vulnerability.

In file https://github.com/happyman/twmap/blob/master/twmap_gen/list.php line 33

$response['sEcho'] = $_REQUEST['sEcho'];
// ...
//print_r($_REQUEST);
exit(json_encode($response));

exit function will terminate the script and print a message which has $_REQUEST. Then there is XSS vulnerability

@enferas
Copy link
Author

enferas commented Dec 2, 2021

CVE-2021-43696 is assigned to this discovery.

An unspecified version of twmap is affected by a Cross Site Scripting (XSS) vulnerability. In file list.php, the exit function will terminate the script and print the message to the user. The message will contain $_REQUEST then there is a XSS vulnerability.

@happyman
Copy link
Owner

@enferas thanks for pointing out. I will update datatable component. https://datatables.net/

happyman added a commit that referenced this issue Dec 22, 2021
@happyman
Copy link
Owner

I upgrade datatables to to lastest legacy version 1.9.4 and filter veriable from frontend..
doc here: https://legacy.datatables.net/examples/data_sources/server_side.html

@happyman happyman closed this as completed Jan 3, 2022
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants