Describe the bug
An authenticated malicious user can take advantage of a Stored XSS vulnerability in the "connections" feature.
To Reproduce
Steps to reproduce the behavior:
1, Login into the panel
2. Go to '/access/setup?type=conn'
3. Change connections
4. Insert Payload:
'><details/open/ontoggle=confirm(1337)>
5. XSS Alert Message
Expected behavior
The removal of script tags is not sufficient to prevent an XSS attack. You must HTML Entity encode any output that is reflected back to the page
Screenshots
Info WebPort-v1.19.17121
Insert payload
xss alert mess
Desktop (please complete the following information):
OS: Windows
Browser Chorme
Version: Version 83.0.4103.106
The text was updated successfully, but these errors were encountered:
Describe the bug
An authenticated malicious user can take advantage of a Stored XSS vulnerability in the "connections" feature.
To Reproduce
Steps to reproduce the behavior:
1, Login into the panel
2. Go to '/access/setup?type=conn'
3. Change connections
4. Insert Payload:
'><details/open/ontoggle=confirm(1337)>
5. XSS Alert Message
Expected behavior
The removal of script tags is not sufficient to prevent an XSS attack. You must HTML Entity encode any output that is reflected back to the page
Screenshots
Desktop (please complete the following information):
OS: Windows
Browser Chorme
Version: Version 83.0.4103.106
The text was updated successfully, but these errors were encountered: