Skip to content

Commit

Permalink
🔒️ Fix an XSS issue in the user/group delete confirmation
Browse files Browse the repository at this point in the history
Requires admin rights to exploit in any way.
With OctoPrint 1.8.0 all cookies with credentials
are http-only and thus not targetable (to my
knowledge) by this.

CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N, Severity Low
  • Loading branch information
foosel committed May 19, 2022
1 parent 89fbcfd commit 77904a7
Showing 1 changed file with 2 additions and 2 deletions.
4 changes: 2 additions & 2 deletions src/octoprint/static/js/app/viewmodels/access.js
Expand Up @@ -324,7 +324,7 @@ $(function () {
title: gettext("Are you sure?"),
message: _.sprintf(
gettext('You are about to delete the user "%(name)s".'),
{name: user.name}
{name: _.escape(user.name)}
),
proceed: gettext("Delete"),
onproceed: function () {
Expand Down Expand Up @@ -656,7 +656,7 @@ $(function () {
title: gettext("Are you sure?"),
message: _.sprintf(
gettext('You are about to delete the group "%(name)s".'),
{name: group.name}
{name: _.escape(group.name)}
),
proceed: gettext("Delete"),
onproceed: function () {
Expand Down

0 comments on commit 77904a7

Please sign in to comment.