Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

XSS Stored on the Network Services Panel (Token Management - Description) #1292

Closed
1 task done
Ug0Security opened this issue Jul 27, 2021 · 0 comments · Fixed by #1297
Closed
1 task done

XSS Stored on the Network Services Panel (Token Management - Description) #1292

Ug0Security opened this issue Jul 27, 2021 · 0 comments · Fixed by #1297
Assignees
Labels

Comments

@Ug0Security
Copy link

  • I confirm that this is an issue rather than a question.

Bug report

Steps to reproduce

1- Go to the network config panel (login if necessary)

image

2- in the "Token description" input put an xss payload eg: <img src=foo onerror=alert(123)>

image

3- Create a new token and profit

image


image

What is expected?

User input should be escaped

What is actually happening?

You can put XSS payload which will be stored and executed each time you load the page

System

Hyperion Server:

Hyperion Server OS:

  • Distribution: Raspbian GNU/Linux 10 (buster)
  • Architecture: arm
  • CPU Model: ARMv7 Processor rev 4 (v7l)
  • CPU Type: Raspberry Pi 3 Model B Rev 1.2
  • CPU Revision: a02082
  • CPU Hardware: BCM2835
  • Kernel: linux (5.10.17-v7+ (WS: 32))
  • Qt Version: 5.7.1
  • Python Version: 3.5.3
  • Browser: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/91.0.4472.124 Safari/537.36

Cheers

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

Successfully merging a pull request may close this issue.

2 participants