You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Multiple stored XSS have been found by @nullvoiddeath and myself (@az0mb13) in Operations inside Ticket IDs in Changes and Problems. There may be more vulnerable endpoints similar to this.
Since these endpoints can be accessed by all the users who have permission, this may be abused to carry out a privilege escalation attack wherein a low privileged user will be able to steal the admin's CSRF token and execute a request to increase their own privileges.
Suggested Fix
Always treat all user input as untrusted data.
Never insert untrusted data except in allowed locations.
Always input or output-encode all data coming into or out of the application.
Always whitelist allowed characters and seldom use blacklisting of characters except in certain use cases.
Always use a well-known and security encoding API for input and output encoding such as the OWASP ESAPI.
Never try to write input and output encoders unless absolutely necessary. Chances are that someone has already written a good one.
Never use the DOM function innerHtml and instead use the functions innerText and textContent to prevent against DOM-based XSS.
As a best practice, consider using the HTTPOnly flag on cookies that are session tokens or sensitive tokens.
As a best practice, consider implementing Content Security Policy to protect against XSS and other injection type attacks.
As a best practice, consider using an auto-escaping templating system.
As a best practice, consider using the X-XSS-Protection response header.
Steps to reproduce
Multiple stored XSS have been found by @nullvoiddeath and myself (@az0mb13) in Operations inside Ticket IDs in Changes and Problems. There may be more vulnerable endpoints similar to this.
Vulnerable Endpoints
Vulnerable Request
Impact
Since these endpoints can be accessed by all the users who have permission, this may be abused to carry out a privilege escalation attack wherein a low privileged user will be able to steal the admin's CSRF token and execute a request to increase their own privileges.
Suggested Fix
OWASP ESAPI
.innerHtml
and instead use the functionsinnerText
andtextContent
to prevent against DOM-based XSS.HTTPOnly
flag on cookies that are session tokens or sensitive tokens.Content Security Policy
to protect against XSS and other injection type attacks.X-XSS-Protection
response header.Environment
Chrome/Firefox latest version
The text was updated successfully, but these errors were encountered: