You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
For transparency reason (and with the authorization of the NCrypt maintainer), the email I sent to NCrypt the 02/03/2017 is reproduced below:
I just found an XSS vulnerability in NCrypt.
How to reproduce
A malicious user create a paste with the content: <script>alert('XSS')</script>
(S)he sends the link to the targeted user
The targeted user clones the paste
The JS payload is executed
As far as I tested it, the choice of programming language don't change the result.
Note: the payload can be "hidden" in a lot of text or code in order to "trick" users.
As far as I know, the impact is quite limited because you don't store the previous posted links in the browser, but it can be used to de-anonymize users for example.
I found this vulnerability because I'm currently and voluntarily searching for XSS vulnerabilities in a lot of FLOSS.
I remain available for any additional comments or questions.
Best,
Martin
The text was updated successfully, but these errors were encountered:
For transparency reason (and with the authorization of the NCrypt maintainer), the email I sent to NCrypt the 02/03/2017 is reproduced below:
I just found an XSS vulnerability in NCrypt.
How to reproduce
<script>alert('XSS')</script>
As far as I tested it, the choice of programming language don't change the result.
Note: the payload can be "hidden" in a lot of text or code in order to "trick" users.
As far as I know, the impact is quite limited because you don't store the previous posted links in the browser, but it can be used to de-anonymize users for example.
I found this vulnerability because I'm currently and voluntarily searching for XSS vulnerabilities in a lot of FLOSS.
I remain available for any additional comments or questions.
Best,
Martin
The text was updated successfully, but these errors were encountered: