Skip to content
This repository has been archived by the owner on Feb 4, 2022. It is now read-only.

Unsanitized Javascript in path #211

Closed
stevenrombauts opened this issue Nov 23, 2015 · 4 comments
Closed

Unsanitized Javascript in path #211

stevenrombauts opened this issue Nov 23, 2015 · 4 comments
Labels
Milestone

Comments

@stevenrombauts
Copy link
Contributor

Adding the string "><script>alert('Oops!')</script> to any path on v2 sites gets the JS code to be executed.

Example:

Source:

@stevenrombauts stevenrombauts self-assigned this Nov 23, 2015
@stevenrombauts stevenrombauts added this to the Current milestone Nov 23, 2015
@tomjanssens tomjanssens changed the title Unsanitized javascript in path Unsanitized Javascript in path Nov 24, 2015
@stevenrombauts
Copy link
Contributor Author

Code has been patched and issues resolved.

@johanjanssens
Copy link
Member

@stevenrombauts Did you also email the organisation who reported it that it was fixed ?

@stevenrombauts
Copy link
Contributor Author

@johanjanssens I sent a message to the researcher who discovered it. He verified the fix (also verified on xssposed.org)

@johanjanssens
Copy link
Member

Thanks, good work!

Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
Projects
None yet
Development

No branches or pull requests

3 participants