Menu

#2660 Location variable injection

pending
Security (98)
5
2012-02-20
2012-01-12
G13
No

The location variable is vulnerable to XSS. Simply add <script>alert(100);</script> to text box and create the event

Discussion

  • Henri Salo

    Henri Salo - 2012-01-23

    When do you plan to fix this? This has been openly announced already: http://seclists.org/bugtraq/2012/Jan/128

    I can help to create the patch if needed. As this is stored cross site scripting security vulnerability you should fix this as soon as possible. I haven't tested this.

    Information about XSS: https://www.owasp.org/index.php/Cross-site_Scripting_\(XSS)

     
  • Henri Salo

    Henri Salo - 2012-02-12

    Verified this issue in demo-page and in 1.2.4 installation.

     
  • Craig Knudsen

    Craig Knudsen - 2012-02-20
    • status: open --> pending
     
  • Craig Knudsen

    Craig Knudsen - 2012-02-20

    The code is now in the REL_1_2 branch and will be included in the 1.2 release.

     
  • Yuri

    Yuri - 2012-12-12

    What is the status of this issue?
    Is XSS attack fix included in 1.2 release?

    FreeBSD has been holding the port update pending this issue.

     

Log in to post a comment.