-
-
Notifications
You must be signed in to change notification settings - Fork 69
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Stored XSS within article creation #253
Comments
Yes. useful link: |
I don't think it is a issue when administrator can input any JavaScript to the articles, but it's an issue that regular writer can do so or are all writers automatically fully trusted? Missing HttpOnly is separate issue, but should be fixed as well. This also affects Debian unstable. |
@bazooka07 as-tu une suggestion pour corriger session.cookie_httponly ? |
Je n'ai pas fait d'essais mais a priori la fonction session_set_cookie_params devrait faire le job avec httponly=true. |
En complement du précèdent post, voici un article à lire:
Autre lien intéressant: |
Regarde que CVE-2017-1001001 assigné à cette vulnérabilité, était-ce réparé? |
Hi @NicoleG25, I think we can have a first fix (PR #357) for the next PluXml release wich is planned for this week. |
A writer or the administrator can write javascript within the page, which can then be used to steal other user's session tokens (actually quite possible as the session token doesn't have HttpOnly enabled). Adding something like , in the article's content stores the payload on the server.
Then any user who visits the page is affected by the payload.
I would advise HTML encoding the user input and also setting the HttpOnly flag on the session token.
The text was updated successfully, but these errors were encountered: