Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Test Cross-site Scripting Vulnerability #40

Open
ehrishirajsharma opened this issue May 24, 2019 · 0 comments
Open

Test Cross-site Scripting Vulnerability #40

ehrishirajsharma opened this issue May 24, 2019 · 0 comments
Labels
help wanted Extra attention is needed

Comments

@ehrishirajsharma
Copy link
Owner

ehrishirajsharma commented May 24, 2019

Recently, Gaurav reported a Self-XSS vulnerability in video-link feature and you can find the fix at @TomasBaskys's recent commit: 5d0e929

However, it was later identified that this self-XSS could be escalated using import feature therefore, we're opening this issue to re-test this fix and find any potential way to bypass it.


Areas to Focus

The only possible way to leverage XSS attack is using import feature (when you try to import other user's library/project) so focus on:

  • Import Feature
  • Bypass Rules for restricted/specified video host providers

Beside you can also look into other areas, where your JS payloads gets stored and run everytime you open. (Templates, Payloads, etc)

Please focus only on Stored-XSS, any Self-XSS related issue wouldn't be taken at priority, as sanitization part take place at the time of storage so there's no real-way to escalate the Self-XSS

Please use latest version for testing this.

For suggestion / questions / fix, you can comment here. To report any possible way to bypass, please send an email at security@swiftness.org

@ehrishirajsharma ehrishirajsharma added the help wanted Extra attention is needed label May 24, 2019
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
help wanted Extra attention is needed
Projects
None yet
Development

No branches or pull requests

1 participant