We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
1- Go to the network config panel (login if necessary)
2- in the "Token description" input put an xss payload eg: <img src=foo onerror=alert(123)>
<img src=foo onerror=alert(123)>
3- Create a new token and profit
User input should be escaped
You can put XSS payload which will be stored and executed each time you load the page
Hyperion Server:
Hyperion Server OS:
Cheers
The text was updated successfully, but these errors were encountered:
Lord-Grey
Successfully merging a pull request may close this issue.
Bug report
Steps to reproduce
1- Go to the network config panel (login if necessary)
2- in the "Token description" input put an xss payload eg:
<img src=foo onerror=alert(123)>
3- Create a new token and profit
What is expected?
User input should be escaped
What is actually happening?
You can put XSS payload which will be stored and executed each time you load the page
System
Hyperion Server:
Hyperion Server OS:
Cheers
The text was updated successfully, but these errors were encountered: