New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Cross Site Scripting Vulnerability on "Security" feature in PHP-Fusion 9.03.60 (New Version) #2331
Comments
|
Update all files |
|
@RobiNN1 |
|
git init or git clone --recursive https://github.com/php-fusion/PHP-Fusion.git php-fusion |
|
@FrederickChan |
|
@RobiNN1 @FrederickChan Thank you very much. |
|
Discord Channel
Invite Link: https://discord.gg/cgBwzWy
On Fri, 22 May 2020 at 3:18 PM, Songohan22 ***@***.***> wrote:
@RobiNN1 <https://github.com/RobiNN1> @FrederickChan
<https://github.com/FrederickChan>
Where can I contact you two.
Can you give me the skype link please.
Thank you very much.
—
You are receiving this because you were mentioned.
Reply to this email directly, view it on GitHub
<https://github.com/php-fusion/PHP-Fusion/issues/2331#issuecomment-632535493>,
or unsubscribe
<https://github.com/notifications/unsubscribe-auth/AA7DTWP5ORUIPB5YW755OTDRSYRKRANCNFSM4NGEE3CQ>
.
--
Regards,
Frederick Chan
|
|
Hi Team Security PHPFusion. You can a CVE ID assigned and reference change log to "UraSec Team" :D Thanks you! |
Describe the bug
An authenticated malicious user can take advantage of a Stored XSS vulnerability in the "security" feature. This was can be bypassed by using HTML event handlers, such as "onload".
To Reproduce
Steps to reproduce the behavior:
<svg/onload=alert(/XSS/)//
Expected behavior
The removal of script tags is not sufficient to prevent an XSS attack. You must HTML Entity encode any output that is reflected back to the page.
Impact
Commonly include transmitting private data, like cookies or other session information, to the attacker, redirecting the victim to web content controlled by the attacker, or performing other malicious operations on the user’s machine under the guise of the vulnerable site.
Screenshots


Desktop (please complete the following information):
The text was updated successfully, but these errors were encountered: