-
-
Notifications
You must be signed in to change notification settings - Fork 128
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Stored xss in user info imported file #1391
Comments
Thanks, really a great awesome idea to post about possible security issues in public and not contacting us responsibly before doing this. Apparently reading the read me or the contributing guidelines on https://github.com/zenphoto/zenphoto/blob/master/contributing.md is too much to be expected, too. Both seem rather low risk as they already require backend access. |
|
Thanks for your response Regards. |
My mistake, my test site had the security headers plugin and the Content Securitty policy frame-src configured accordingly already ("nonce-" for example fixes this by blocking all iframes in general). Since iframe usage is a valid usage as almost anything like Youtube videos uses iframes for embedding, we cannot set this globally for everyone except blocking everything. So it is actually up to each user to do this matching his usage and which iframe sources he wants to allow.
I was naturally referring to escaping the script within the user data html export. This after all is a backend only function so primarily affects those users who have the right to do this. Either the user himself who entered it or a full admin of the site. |
Does this issue i reported have a bounty eligibility. |
We don't do bounties and even if we would it would require responsible reporting. |
This is actually not completely true, 2) we will fix and for 1) we will at least note a recommendation respectively add strict defaults to the security headers plugin. |
Ok, thanks for the update.
…On Fri, Jun 2, 2023, 12:34 PM Malte Müller ***@***.***> wrote:
closed this as [not planned]
This is actually not completely true, 2) we will fix and for 1) we will at
least note a recommendation respectively add strict defaults to the
security headers plugin.
—
Reply to this email directly, view it on GitHub
<#1391 (comment)>,
or unsubscribe
<https://github.com/notifications/unsubscribe-auth/AZSGRW2KVRXKGVDADTPD7RLXJGF7FANCNFSM6AAAAAAYWRON4E>
.
You are receiving this because you modified the open/close state.Message
ID: ***@***.***>
|
Application: Zenphoto-1.6 xss poc
Version: 1.6
Bugs: XSS
Technology: PHP
Vendor URL: https://www.zenphoto.org/news/zenphoto-1.6/
Software Link: https://github.com/zenphoto/zenphoto/archive/v1.6.zip
Tested on: Linux
========================================
###XSS-1###
steps:
=====================================================
###XSS-2###
steps:
2.change postal code as <script>alert(4)</script>
3.if admin user information import as html , xss will trigger
The text was updated successfully, but these errors were encountered: