Description
Mateusz Krzeszowiec opened SPR-10484 and commented
The form tag is vulnerable to XSS through the path. Although the query string is being escaped before being printed then the path is not escaped at all. This can lead to quite easily exploitable cross site scripting issue, sample attack vector could look like:
http://yourwebsite.com/text1/notescaped/text2/?escaped=escaped
where notescaped could be: /Company" onmouseover=prompt(12345689) bad="/somethinghere
or notescaped="><script>alert('pwned');</script>
The problem can be exploited when you're NOT specifying the action attribute.
The reference URL points out the line in which the path part of the URL (requestUri, at this point without query string yet) could be escaped.
Affects: 3.0 GA, 3.1 GA, 3.2 GA
Attachments:
- dom.png (25.92 kB)
1 votes, 4 watchers