You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
I have tried sanitizing the url through middleware but the parameters do not appear when picking up the request.
Has anyone had this happen or have an idea how I can fix it?
reacted with thumbs up emoji reacted with thumbs down emoji reacted with laugh emoji reacted with hooray emoji reacted with confused emoji reacted with heart emoji reacted with rocket emoji reacted with eyes emoji
-
Hi,
In my website a pentest was passed and we detected a Cross-Site Scripting (XSS) vulnerability in the pdf.js by adding certain GET parameters to the url, example: {my_web}/pdfjs/web/web/viewer.html?file=alert%281%29%29https://morth.nic.in/sites/default/files/dd12-13_0.pdf&disableDownload=alert%281%29false&disableRequest=alert%281%29true&reqCallback=alert%281%29&alert%281%29=&callback=alert%281%29testDocEnd%283258%29&locale=alert%281%29en#
This loads the PDF and executes an alert when the Request button is clicked.
I have tried sanitizing the url through middleware but the parameters do not appear when picking up the request.
Has anyone had this happen or have an idea how I can fix it?
Beta Was this translation helpful? Give feedback.
All reactions