Skip to content
This repository was archived by the owner on Mar 21, 2018. It is now read-only.
This repository was archived by the owner on Mar 21, 2018. It is now read-only.

A reflected Cross Site Scripting (XSS) vulnerability exists in the LogViewer. #67

@cjke

Description

@cjke

We've had our soon to be launched site externally security tested. The security auditors use the AS/NZS 31000:2009 standard for assessing risk. A few issues recorded were linked directly to the LogViewer component. I will include a new issue per issue recorded by security audit.

Consequence Moderate
In a reflected XSS attack, the attack is in the request itself (frequently the URL) and the vulnerability occurs when the server inserts the attack in the response verbatim or incorrectly escaped or sanitized.

The LogViewer takes input from the PATH_INFO in a user’s request and uses that to build a hyperlink on the page. This can be highjacked to introduce a Cross Site Scripting vulnerability. For example, the following https://example.com/admin/logs/app/apache/%3CA%20HREF=%22javascript:alert(1)%22%3Eetc will create a link “etc” on the page and if clicked will execute Javascript: In most cases the user’s web browser’s XSS mitigation should catch the attempt to execute Javascript – however – this cannot be relied upon and should be fixed.

capture3

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions