Go to Top

Flyspray 'real_name' Cross Site Scripting Vulnerability

HTTPCS160 Flyspray 1.0-rc4 2017-04-24 Less Critical A vulnerability has been discovered in Flyspray , which can be exploited by malicious people to conduct cross-site scripting attacks. Input passed via the 'real_name' parameter to '/index.php?do=myprofile' is not properly sanitised before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site. /index.php?do=myprofile csrftoken=1061054859&real_name=[VulnHTTPCS]&email_address=testhttpcs2@httpcs.com&profile_image=¬ify_type=0&dateformat=%d.%m.%Y&dateformat_extended=%d.%m.%Y %H:%M&tasks_perpage=25&time_zone=0&lang_code=en&old_global_id=4&old_group_id=8&project_id=1&oldpass=&changepass=&confirmpass=&action=myprofile.edituser&user_id=3 XSS POST The vendor did not propose a solution yet https://www.httpcs.com/en/advisory/httpcs160 CYRIL VALLICARI / HTTPCS / ZIWIT