mitigating XSS attack#218
Conversation
XSS Vulnerability detailTested using FireFox 54.0 noted that the search functionality was vulnerable to XSS Example is the following link: The issue occurs as the search string is written into the HTML which provides the text input for the search. The above attack string forces a html breakout resulting in javascript code execution within the victims browser, please see the screenshot below for a proof. The URL could be manipulated to run any arbitrary javascript within the victim browser e.g. to steal cookie information, session information / tokens etc. I can confirm that version 2.1.5 is not susceptible to this XSS attack |
|
I can reserve more comments for you. Since I work at GitHub I get up to |
|
Can I get one too? I want it to appear before @Oneiroi's. I'm willing to pay for it! |
|
I will pay more than Kenny |
|
$100! |
|
ok, he can have it |
|
That's it. No more free comments! |

The web form was using texts provided as query params. This is now mitigated by escaping values to disable javascript execution.
cc @Oneiroi