Issue 2550654
Created on 2010-06-30 14:37 by benjamin, last changed 2010-07-01 01:54 by richard.
msg4079 |
Author: [hidden] (benjamin) |
Date: 2010-06-30 14:37 |
|
There's an XSS vulnerability in Roundup's handling of the template argument. An example URL
would be
http://issues.roundup-tracker.org/issue?
@template=%3C/strong%3E%3Chtml%3E%3Chead%3E%3Cscript%3Ealert(%22Escape%20your%20st
rings%22)%3C/script%3E%3C/head%3E%3C/html%3E%3Cstrong%3E&status=1
This would allow JavaScript to access all cookies, make random changes to Roundup, etc.
|
msg4080 |
Author: [hidden] (benjamin) |
Date: 2010-06-30 14:39 |
|
...and the fact that Roundup is passing arbitrary HTML in the URL for this case being submitted
isn't great either, as it has the exact same problem. (Potentially worse, since this one allows
arbitrary injection on a normal, non-error page)
http://issues.roundup-tracker.org/issue2550654?
@ok_message=msg%204079%20created%3Cbr%3Eissue%202550654%20created&@template=ite
m
|
msg4081 |
Author: [hidden] (richard) |
Date: 2010-07-01 01:44 |
|
Thanks, this is fixed in r4486 and will be released ASAP.
|
msg4082 |
Author: [hidden] (richard) |
Date: 2010-07-01 01:54 |
|
BTW the ok and error message variables are specifically handled: they're allowed to have an
extremely limited set of HTML.
|
|
Date |
User |
Action |
Args |
2010-07-01 01:54:31 | richard | set | messages:
+ msg4082 |
2010-07-01 01:44:53 | richard | set | status: new -> closed nosy:
+ richard messages:
+ msg4081 priority: immediate assignee: richard resolution: fixed |
2010-06-30 14:39:43 | benjamin | set | messages:
+ msg4080 |
2010-06-30 14:37:17 | benjamin | create | |
|