Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Request for category: "Client side only" XSS #448

Open
nightpool opened this issue Feb 16, 2025 · 0 comments
Open

Request for category: "Client side only" XSS #448

nightpool opened this issue Feb 16, 2025 · 0 comments

Comments

@nightpool
Copy link

nightpool commented Feb 16, 2025

Hi all!

One vulnerability submission that we get a lot of and have to deny is a "self-only" XSS e.g. a user pastes a vulnerable snippet into a comment field, the client-side application renders it as submitted optimistically, but then when the server processes the submission it correctly sanitizes it. This is a really common pattern we see a lot throughout our application due a heavy use of both 1) optimistic rendering and 2) server-side HTML sanitization.

The only self XSS categories currently available are "Reflected > Self-only" and "Stored > Self-only", but neither of those are applicable in this case since the XSS is client-side only and does not involve the server or server responses at all. (Reflected refers to the XSS being sent from the server in some way e.g. a self-only reflected XSS vulnerability would be a "Preview Markdown" API endpoint and a stored self-only vulnerability would refer to e.g. data that is saved in the user's profile but only shown to the user).

Suggestions welcome! From our perspective, this is ~about the same severity as the user being socially engineered into pasting something into their browser's developer console or similar—maybe worth a compensating control in the most sensitive apps, but P5/not really in scope for most teams.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Development

No branches or pull requests

1 participant