Skip to content
This repository has been archived by the owner on Mar 21, 2018. It is now read-only.

A reflected Cross Site Scripting (XSS) vulnerability exists in the LogViewer. #67

Open
cjke opened this issue Jun 15, 2014 · 0 comments

Comments

@cjke
Copy link

cjke commented Jun 15, 2014

We've had our soon to be launched site externally security tested. The security auditors use the AS/NZS 31000:2009 standard for assessing risk. A few issues recorded were linked directly to the LogViewer component. I will include a new issue per issue recorded by security audit.

Consequence Moderate
In a reflected XSS attack, the attack is in the request itself (frequently the URL) and the vulnerability occurs when the server inserts the attack in the response verbatim or incorrectly escaped or sanitized.

The LogViewer takes input from the PATH_INFO in a user’s request and uses that to build a hyperlink on the page. This can be highjacked to introduce a Cross Site Scripting vulnerability. For example, the following https://example.com/admin/logs/app/apache/%3CA%20HREF=%22javascript:alert(1)%22%3Eetc will create a link “etc” on the page and if clicked will execute Javascript: In most cases the user’s web browser’s XSS mitigation should catch the attempt to execute Javascript – however – this cannot be relied upon and should be fixed.

capture3

Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant