Skip to content

Commit

Permalink
ArmedGoose data for issue #206
Browse files Browse the repository at this point in the history
  • Loading branch information
code423n4 committed Jan 28, 2023
1 parent 6175bf8 commit 42e3ae8
Showing 1 changed file with 13 additions and 0 deletions.
13 changes: 13 additions & 0 deletions data/ArmedGoose-Q.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,13 @@
SVG is rendering with unsanitized special charaters.
The rendering function is using user input (string) (string memory questId_) to output an SVG. This might be lead to issues in the future, since SVG format allows for embedding javascript scripts inside, so potentially, if that function has any other use in the future, it might be abused to generate malicious images.
However, at the moment probability is low, since it uses existing questId is created by administrative role, and anyone in posession of administrative role have plenty of other attack vectors than xssing users.

Occurence:
https://github.com/rabbitholegg/quest-protocol/blob/main/contracts/ReceiptRenderer.sol#L100

Remediation:
Filter special characters, at least <, >, ", ' ideally allow only alphanumeric ones in the function.

References:
https://github.com/code-423n4/2022-01-timeswap-findings/issues/131
https://securiumsolutions.com/blog/xss-through-svg-file-upload/

0 comments on commit 42e3ae8

Please sign in to comment.