-
Notifications
You must be signed in to change notification settings - Fork 57
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
found Multiple issues #220
Comments
Thanks for reporting, we'll look into it! |
Okay, I reported these issues four months ago, and I have still not received a response for my report |
Hello team, How many days will it take to patch the vulnerabilities? I have provided secure code snippets and detailed functions for patching the vulnerability. Could you please check my replies on huntr.dev? Parag Bagul |
Hello Parag Bagul, thanks for asking and for your code snippets. FlatPress is maintained in spare time by a cheerful group of volunteer developers. We would be happy if you join us as a developer, derive a fork of FlatPress and support us with pull requests for further development. With best regards |
Idea:
This is to prevent the filename/input field and its extension from containing special characters like < > () =. For email_address input: It verifies that:
|
Dear Frank use below codes for prevent file upload xss vulnerability: Vulnerability poc: 1.Sanitize User Input: $file_name = filter_var($_POST['file_name'], FILTER_SANITIZE_STRING); 2.Validate File Names: if (!preg_match('/^[a-zA-Z0-9_-]+$/', $file_name)) { 3.Escape Output: echo htmlspecialchars($file_name, ENT_QUOTES, 'UTF-8'); This will encode characters like <, >, and & into their respective HTML entities, making them safe for display in HTML. |
@azett , normally I assign these preventions to basic filesystem handling. Does the uploader use this core module?
|
Dear Team, I have shared all my recommendations, including code snippets, for addressing the patch file upload XSS vulnerability. You can access the full report on huntr.dev at the following link: https://huntr.dev/bounties/a993a05f-be50-4983-a44a-3bbff1ec00db/. Additionally, I kindly request that you review my findings related to the Cross-Site Scripting (XSS) issue in the Flatpress installer parameter's username field. The detailed report is available here: https://huntr.dev/bounties/a38bb7c5-7e17-4a65-8b43-04e4024febaf/. I kindly request that you promptly close these issues, and I would also appreciate your assistance in assigning a CVE number for the resolved vulnerabilities. Your swift action in this matter would be highly valuable. Thank you for your attention and support. Best Regards, Parag Bagul |
Dear Team, Any update when i suppose to receive the cve number for resolve vulnerabilities ? Best regards |
Dear @Fraenkiman can i request cve from cve mitra for cross site scripting vulnerabilty that is patched by you. Best regards, |
Dear @Fraenkiman can i request cve from cve mitra for cross site scripting vulnerabilty that is patched by you. in huntr.dev you have created private advisery can i request cve from my side Best regards, |
Dear @Fraenkiman can i request cve from cve mitra for cross site scripting vulnerabilty that is patched by you. in huntr.dev you have created private advisery can i request cve from my side can you please assign cve number for patched vulnerabilities Best regards, |
Hi, I reported vulnerabilities a year ago that have been patched. Could you please assign CVE numbers for these vulnerabilities? Best regards, |
Hii @Fraenkiman can you please review these finding as well because i reported these vulnerabilities one year ago. Best regards |
- File uploads are validated and cleaned up more strictly. - In addition, directory traversal attacks are prevented.
file upload issue:https://huntr.dev/bounties/a993a05f-be50-4983-a44a-3bbff1ec00db/
directory traversal:https://huntr.dev/bounties/4ca6d3c1-b3cf-4c64-b8ea-4977a474d725/
csrf:https://huntr.dev/bounties/b30ef7b0-74ea-4cac-adc4-1cc8a5cb559e/
cross site scripting:https://huntr.dev/bounties/a38bb7c5-7e17-4a65-8b43-04e4024febaf/
Offered support requested from Parag Bagul
The text was updated successfully, but these errors were encountered: