Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

XSS Issues #3875

Closed
rcubetrac opened this issue Aug 14, 2012 · 4 comments
Closed

XSS Issues #3875

rcubetrac opened this issue Aug 14, 2012 · 4 comments

Comments

@rcubetrac
Copy link

Reported by NightRanger on 14 Aug 2012 19:55 UTC as Trac ticket #1488613

  1. Description: Stored XSS in e-mail body.

Send an html formatted email to the victim with the following html code: <a href=javascript:alert("XSS")>Click Me.

You can do this also from the WYSIWYG editor by creating a new link and in the url insert: javascript:alert("XSS").

The insert link function doesn't validates URL properly.

once the user clicks on the url the XSS should be triggered.

  1. Self XSS in e-mail body (Signature).

In order to trigger this XSS you should insert the payload: "><img src='1.jpg'onerror=javascript:alert("XSS")> into your signature

Settings -> Identities -> Your Identitiy -> Signature
Now create a new mail, XSS Should be triggered.

Keywords: XSS
Migrated-From: http://trac.roundcube.net/ticket/1488613

@rcubetrac
Copy link
Author

Comment by @alecpl on 15 Aug 2012 08:13 UTC

  1. fixed in 5ef8e4a.

@rcubetrac
Copy link
Author

Milestone changed by @alecpl on 15 Aug 2012 08:13 UTC

later => 0.8.1

@rcubetrac
Copy link
Author

Comment by @alecpl on 15 Aug 2012 09:24 UTC

  1. fixed in c086978. For the record, 1st was a regression in 0.8. 2nd has a less severity, so I don't think we need backport to 0.7.

@rcubetrac
Copy link
Author

Status changed by @alecpl on 15 Aug 2012 09:24 UTC

new => closed

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

1 participant