New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Reflected XSS in OpenBay Template #190

Open
ProDigySML opened this Issue Jul 18, 2018 · 1 comment

Comments

Projects
None yet
2 participants
@ProDigySML
Copy link

ProDigySML commented Jul 18, 2018

The Issue

Reflected Cross-Site Scripting (XSS) may allow an attacker to execute JavaScript code in the context of the victim's browser. This may lead to unauthorised actions being performed, unauthorised access to data, stealing of session information, denial of service, etc. An attacker needs to coerce a user into visiting a link with the XSS payload to be properly exploited against a victim.

Where the Issue Occured

The following code shows that the $_GET['token'] variable is reflected to the victim's browser without any input validation, leading to reflected XSS:

var token = "<?php echo $_GET['token']; ?>";

An example payload for the token variable is given below:
"; alert(1); //

@villagedefrance

This comment has been minimized.

Copy link
Owner

villagedefrance commented Jul 22, 2018

Thank you for flagging this.
OpenBay will eventually be completely removed in future versions.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment