-
Notifications
You must be signed in to change notification settings - Fork 296
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Reflected XSS Vulnerability in Search Tag #2038
Comments
That's a good catch! Thank you for the report. |
It affect the title tag of the bookmark list page. Fixes shaarli#2038
@ArthurHoaro I will be reporting the issue to Mitre and requesting a CVE ID. The vulnerability will be referenced, and once the patch is implemented, the CVE will be released. Thank you for the patch. |
It affect the title tag of the bookmark list page. Fixes #2038
It affect the title tag of the bookmark list page. Fixes #2038
https://demo.shaarli.org has been updated as well |
Version v0.12.2
I have identified a Reflected Cross-site Scripting (XSS) vulnerability that could potentially be exploited by attackers to execute malicious code within the context of a user’s web browser.
The vulnerability occurs when unsanitized user input is directly embedded into the HTML output of the search tag functionality without proper encoding or validation. This allows an attacker to craft a specially crafted URL containing malicious JavaScript code, which, when clicked by another user, will be executed within their browser, potentially leading to unauthorized access, session hijacking, or other malicious activities.
Payload:
I want to apply for a CVE ID. I’m not sure if it’s possible.
The text was updated successfully, but these errors were encountered: