Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[SECURITY] - Stored Cross-site Scripting vulnerability before deleting a Scan Engine! #459

Closed
TheBinitGhimire opened this issue Aug 20, 2021 · 0 comments
Labels
Security Security related issues Work in Progress Working

Comments

@TheBinitGhimire
Copy link
Contributor

TheBinitGhimire commented Aug 20, 2021

Issue Summary

In reNgine v1.0, there is Stored Cross-site Scripting before deleting a Scan Engine!

Steps to Reproduce

  1. Visit your reNgine instance, and login to your account.
  2. Head over to the /scanEngine/ endpoint.
  3. Click on "Add New Engine" and write ');alert('XSSed by Binit at '+document.location+'!');// in the Engine name field.
  4. Now, click on the "Add Engine" button to save the changes.
  5. Click on the Delete icon (cross icon) next to the engine name, and the payload will be executed.

image

Here, the payload will be executed through the values inside the onclick attribute, as shown in the image below:

image

  • I have confirmed that this issue can be reproduced as described on a latest version/pull of reNgine: yes

Technical details

  • Debian 4.19.181-1
@yogeshojha yogeshojha added Security Security related issues Work in Progress Working labels Aug 23, 2021
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Security Security related issues Work in Progress Working
Projects
None yet
Development

No branches or pull requests

2 participants