-
Notifications
You must be signed in to change notification settings - Fork 444
Stored & Reflected XSS in Exhibitor v1.5.6 #356
Comments
Hi, thanks for the very detailed report. |
Hi @xiaochuanyu , Thanks for Response. This issue can be fixed by validating all the input that is coming from various components of the website like the database, end user, a web service, forms, hidden form fields, cookies, query strings etc. This can be ensured in two ways: • Validating the input fields: The most effective method of addressing XSS vulnerabilities is to only accept and process data that is considered valid and reject everything else. This process entails White-List validation by permitting only those characters that may be legitimate input for a given field. For example, if the field is meant to accept a telephone number it should filter out or escape out all characters other than [0-9] and -. : <,>,”,’,%,;,&,(,),+. • Escaping All Output: This process entails HTML Encoding all characters to prevent any execution. For example, if the < character is encoded to < then it will not be interpreted by the browser as the start of a tag and would simply be displayed as <. Let me know anything else you required. |
Hi @xiaochuanyu , Any update on Fixes. |
I found that the following string can be added to the node explorer, allowing an attacker to create a stored cross site scripting (XSS) that can be seen under the logs tab.
Payload : "><img+src=x+onerror=alert('XSS')>.
Attached some screenshots
The text was updated successfully, but these errors were encountered: