•  
      request #9501 Reflected XSS in the project list page in the site administration
    Infos
    #9501
    Thomas Gerbet (tgerbet)
    2016-10-17 11:35
    2016-09-16 14:34
    9769
    Details
    Reflected XSS in the project list page in the site administration

    A reflected XSS could be injected via the parameters status of the project list page in the site administration.

    Impact

    An attacker could use this vulnerability to force a victim to execute uncontrolled code.
    CVSSv3 score: 6.1 (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N)

    Exploitation

    With a user having site administration rights, go to https://<tuleap_url>/admin/grouplist.php?status="><script>alert(1)</script>

    If you a browser having good content security policy support, the vulnerability can be less easy to exploit.

    References

    https://cwe.mitre.org/data/definitions/79.html
    https://www.owasp.org/index.php/Cross-site_Scripting_%28XSS%29

    Credit

    Thanks to Mehmet Ince from PRODAFT for having disclosed responsibly this vulnerability.

    Site admin
    All
    Empty
    • [ ] enhancement
    • [ ] internal improvement
    Empty
    Stage
    Empty
    Closed
    2016-09-17
    Attachments
    Empty
    References

    Follow-ups

    User avatar
    Thomas Gerbet (tgerbet)2016-09-23 16:40
    Add credit.

    • Original Submission
      Something went wrong, the follow up content couldn't be loaded
      Only formatting have been changed, you should switch to markup to see the changes
    User avatar
    Tuleap 8.19.99.1

    • Status changed from Under review to Closed
    • Connected artifacts
    • Close date set to 2016-09-17