The vulnerability exists due to insufficient filtration of user-supplied data in "challenge" HTTP parameter that will be passed to "tdm-master/webhook.php". The infected source code is line 5, there is no protection on $_GET['challenge'], if it contains evil js code, line 72 will trigger untrusted code to be executed on the browser side.
So if a attacker construct a special url as follow and send it to a victim, when the victim click the url, the code which is contained in the url will be executed on the victim's browser side to do some evil. http://your-web-root/tdm-master/webhook.php?challenge="><script>alert(1);</script><"
The follow scrrenshot is the result to click the upper url ( win7 sp1 x64 + firefox 51.0.1 32bit ):
Discoverer: ADLab of Venustech
The text was updated successfully, but these errors were encountered:
Add a suppression file to ignore false positives reported by dependency-check plugin on Jenkins. The entery in this file suppresses false positives for CVE-2017-7871, which deals with trollepierre/tdm#50, which is not related to our TDM module (totally different project).
Add a suppression file to ignore false positives reported by dependency-check plugin on Jenkins. The entery in this file suppresses false positives for CVE-2017-7871, which deals with trollepierre/tdm#50, which is not related to our TDM module (totally different project).
cwardgar
pushed a commit
to Unidata/thredds
that referenced
this issue
Nov 20, 2017
Add a suppression file to ignore false positives reported by dependency-check plugin on Jenkins. The entery in this file suppresses false positives for CVE-2017-7871, which deals with trollepierre/tdm#50, which is not related to our TDM module (totally different project).
Hello:
I have find a Reflected XSS vulnerability.
The vulnerability exists due to insufficient filtration of user-supplied data in "challenge" HTTP parameter that will be passed to "tdm-master/webhook.php". The infected source code is line 5, there is no protection on $_GET['challenge'], if it contains evil js code, line 72 will trigger untrusted code to be executed on the browser side.


So if a attacker construct a special url as follow and send it to a victim, when the victim click the url, the code which is contained in the url will be executed on the victim's browser side to do some evil.
http://your-web-root/tdm-master/webhook.php?challenge="><script>alert(1);</script><"
The follow scrrenshot is the result to click the upper url ( win7 sp1 x64 + firefox 51.0.1 32bit ):

Discoverer: ADLab of Venustech
The text was updated successfully, but these errors were encountered: