Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

XSS vulnerability in /includes/prefs.inc.php #14

Open
JordyZomer opened this issue Feb 14, 2018 · 0 comments
Open

XSS vulnerability in /includes/prefs.inc.php #14

JordyZomer opened this issue Feb 14, 2018 · 0 comments

Comments

@JordyZomer
Copy link

Hey,

I would like to report a XSS vulnerability in /includes/prefs.inc.php

If the value of $_POST['key'] is set to some malicious javascript E.G. "<script>alert(document.cookie)</script>" then it will execute this. An attacker can use XSS to send a malicious script to an unsuspecting user. The end user’s browser has no way to know that the script should not be trusted, and will execute the script. Because it thinks the script came from a trusted source, the malicious script can access any cookies, session tokens, or other sensitive information retained by the browser and used with that site.

I couldn't find anywhere else to contact you so this seemed the right way.

I advise you to use htmlspecialchars() with ENT_QUOTES to filter the user-input. Since it looks like this file shouldn't be accessed by users at all it might be worth protecting the file with a .htaccess file.

Kind Regards,

Jordy Zomer

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant