Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Reflected XSS in OpenBay Template #190

Open
prodigysml opened this issue Jul 18, 2018 · 2 comments
Open

Reflected XSS in OpenBay Template #190

prodigysml opened this issue Jul 18, 2018 · 2 comments

Comments

@prodigysml
Copy link

The Issue

Reflected Cross-Site Scripting (XSS) may allow an attacker to execute JavaScript code in the context of the victim's browser. This may lead to unauthorised actions being performed, unauthorised access to data, stealing of session information, denial of service, etc. An attacker needs to coerce a user into visiting a link with the XSS payload to be properly exploited against a victim.

Where the Issue Occured

The following code shows that the $_GET['token'] variable is reflected to the victim's browser without any input validation, leading to reflected XSS:

var token = "<?php echo $_GET['token']; ?>";

An example payload for the token variable is given below:
"; alert(1); //

@villagedefrance
Copy link
Owner

Thank you for flagging this.
OpenBay will eventually be completely removed in future versions.

@huntr-helper
Copy link

‎‍🛠️ A fix has been provided for this issue. Please reference: 418sec#1

🔥 This fix has been provided through the https://huntr.dev/ bug bounty platform.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

3 participants