Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

xss - Reflected Cross Site Scripting issue #179

Open
webhamm opened this issue May 9, 2017 · 3 comments
Open

xss - Reflected Cross Site Scripting issue #179

webhamm opened this issue May 9, 2017 · 3 comments

Comments

@webhamm
Copy link

webhamm commented May 9, 2017

How to reproduce

  1. Navigate to the below URL.
    http://wysibb.com/demo/
  2. Click on “Insert image” button.
  3. Enter this below payload in input field and click on “Save” button.
    https://test.github.com/test/?">.jpg
  4. Now Again click on "save” button.
  5. Observe that an alert box is displayed in the browser which proves Reflected
    Cross Site Scripting.
@webhamm
Copy link
Author

webhamm commented May 9, 2017

https://test.github.com/test/?"><iMg src=N onerror=alert(document.cookie)>.jpg

@Q8hma
Copy link

Q8hma commented May 10, 2017

this is the code
.replace(/\&lt;/g,"<").replace(/\&gt;/g,">").replace(/\&#123;/g,"{").replace(/\&#125;/g,"}");

but where to put it :)

@neuoy
Copy link

neuoy commented Jun 23, 2017

To turn this into an actual XSS attack, you have to make the server accept and publish your bbcode ; so I'm not sure where WysiBB is concerned by this issue. Isn't the server-side parser + conversion to HTML that must be secure enough to detect such attacks? Unless you want to trick a user into copy/pasting your image link in the editor (but then you could also trick him into pasting javascript code in the browser console...)

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

3 participants