[Security] Refected XSS in doku.php #2061
Comments
Did not check all msg ref yet, but I wonder why not sanitize inside the function, because it does not need to contain any html tag. |
@trichimtrich I am not sure whether "No raw HTML is contained" before everything is checked through. I have seen |
Yeah, the message function is used in some cases with HTML output. Eg to display links. We try to sanitize before passing things on to It might be an idea to make |
This issue has been assigned CVE-2017-12583 |
I have just released two hotfix releases of DokuWiki which include commit 6057f47's fix:
Thanks for reporting and fixing this issue. |
Bug
Field
at
is not sanitized inmsg
error message. It's a reflected XSS.Detail
doku.php
PoC
http://localhost/dokuwiki/doku.php?id=wiki:welcome&at=<svg onload=alert(cookie)>
The text was updated successfully, but these errors were encountered: