Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Multiple reflected XSS #7133

Open
5 of 6 tasks
tsparksh opened this issue Jan 7, 2020 · 5 comments
Open
5 of 6 tasks

Multiple reflected XSS #7133

tsparksh opened this issue Jan 7, 2020 · 5 comments
Labels
bug the issue is regarding one of our programs which faces problems when a certain task is executed

Comments

@tsparksh
Copy link
Member

tsparksh commented Jan 7, 2020

Please describe the problem (or idea)

What happened just before the problem occurred? Or what problem could this idea solve?

While taking the input for the comment, filtering of input does not happen so that XSS script is executed.
Payload I've used: <img src=x onerror=prompt('xss')>

Please show us where to look

Please have a look at this link for more information on XSS.
Filter the input containing Script tags like <,>-,% and all other payload inputs


Thank you!

Your help makes Public Lab better! We deeply appreciate your helping refine and improve this site.

To learn how to write really great issues, which increases the chances they'll be resolved, see:

https://publiclab.org/wiki/developers#Contributing+for+non-coders

@tsparksh tsparksh added the bug the issue is regarding one of our programs which faces problems when a certain task is executed label Jan 7, 2020
@tsparksh
Copy link
Member Author

tsparksh commented Jan 7, 2020

This issue may be helpful #3549

@jywarren
Copy link
Member

jywarren commented Jan 7, 2020 via email

@Uzay-G
Copy link
Member

Uzay-G commented Jan 7, 2020

We can use built-in Rails sanitizers for this.

@jywarren
Copy link
Member

jywarren commented Jan 7, 2020

Here, each template with the above vulnerabilities could be resolved by replacing:

<%= params[:potentially_unsafe_user_generated_content]%>

with

<%=h params[:potentially_unsafe_user_generated_content]%>

Yeah!

@stale stale bot added the stale label Oct 7, 2020
@publiclab publiclab deleted a comment from stale bot Oct 8, 2020
@stale stale bot removed the stale label Oct 8, 2020
@jywarren
Copy link
Member

I think i got them all and made FTOs from them. 5 and 6 should be tested one more time on stable.publiclab.org once they merge!

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
bug the issue is regarding one of our programs which faces problems when a certain task is executed
Projects
None yet
Development

No branches or pull requests

3 participants