Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

XSS Vulnerability #896

Closed
mbabker opened this issue Oct 20, 2016 · 4 comments
Closed

XSS Vulnerability #896

mbabker opened this issue Oct 20, 2016 · 4 comments

Comments

@mbabker
Copy link
Contributor

mbabker commented Oct 20, 2016

I'm making an executive decision to publicly disclose this known XSS vulnerability, before anyone else comments on that aspect of things.

Originally reported in September 2015 and again sometime in 2016 by CYBER WARR?OR BUG RES. - AaCcTt and Kenan Genç - ZerOne

The search-user parameter used on the /users route is vulnerable to XSS, confirmable via https://issues.joomla.org/users?search-user=%22%3E%3Cimg+src%3Dx+onerror%3Dprompt(1)%3E.

This issue has ONLY been confirmed on the live hosting server. I cannot replicate this in my local environment nor on other hosting platforms I have deployed the tracker to specifically to validate this.

I can independently confirm that there is not a higher level vulnerability in the Joomla! Framework. https://issues.joomla.org/xte.php demonstrates this, the script that is executed can be found at https://gist.github.com/mbabker/423302220d26769a169bf56506e7ae5a.

I am making this issue public now because after a year looking at this on and off and having independent reports of the issue, I cannot confirm it in any environment except the live hosting platform and neither myself nor active JSST members have identified a code fix for this. I feel that the security risk of this issue at this time is not of such severity that it is a high risk to disclose unfixed.

@b2z
Copy link
Member

b2z commented Oct 21, 2016

Yes I do remember we have discussed it by email and I also cannot reproduce it locally or on my testing server:
http://jtracker.j4devs.ru/users?search-user=%22%3E%3Cimg+src%3Dx+onerror%3Dprompt(1)%3E

Weird issue :(

@btoplak
Copy link

btoplak commented Oct 23, 2016

PHP version or extension related?
Can you share the FPA report with me? Privately

@mbabker
Copy link
Contributor Author

mbabker commented Oct 23, 2016

This isn't a CMS install. There is no FPA report to be generated. All of the code on the server can be found in this repository or installed via composer install (for the third party dependencies).

@btoplak
Copy link

btoplak commented Oct 23, 2016

OK. I was interested in the PHP and PHP-extensions part only anyway

@mbabker mbabker closed this as completed Apr 2, 2019
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

3 participants