Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Data in $data['alertSuccess'] and $data['alertDanger'] is passed directly to the DOM without any filtering, resulting in XSS vulnerability.
$data['alertSuccess']
$data['alertDanger']
<?php if (isset($data['alertSuccess'])) { echo '<div class="alert alert-success" > <button type="button" class="close" data-dismiss="alert"> <span aria-hidden="true">×</span> <span class="sr-only">'.CLOSE.'</span> </button> '; foreach ($data['alertSuccess'] as $alert) { echo "$alert\n"; } echo '</div>'; } elseif (isset($data['alertDanger'])) { //print_r($data['alertDanger']); echo '<div class="alert alert-danger" > <button type="button" class="close" data-dismiss="alert"> <span aria-hidden="true">×</span> <span class="sr-only">'.CLOSE.'</span> </button> <ul>'; foreach ($data['alertDanger'] as $alert) { echo "<li>$alert</li>\n"; } echo '</ul></div>'; } ?>
Related codes
Untrusted input data is in different ways, filter the output node may be a good idea.
Whats your opinion?
The text was updated successfully, but these errors were encountered:
yes you are right, i hadn't filter the strings. i'll fix this soon. thanks @Xyntax
Sorry, something went wrong.
Security Fix #61 #62 #63 #65 #66 #67
abfbb61
semplon
No branches or pull requests
Data in
$data['alertSuccess']and$data['alertDanger']is passed directly to the DOM without any filtering, resulting in XSS vulnerability.Related codes
Untrusted input data is in different ways, filter the output node may be a good idea.
Whats your opinion?
The text was updated successfully, but these errors were encountered: