Modify ↓
Opened 13 years ago
Closed 13 years ago
#9734 closed defect (fixed)
DOM injection vulnerability in NoteBox.expand_macro()
Reported by: | Alex Willmer | Owned by: | Ryan J Ollos |
---|---|---|---|
Priority: | high | Component: | NoteBoxMacro |
Severity: | critical | Keywords: | security |
Cc: | Ryan J Ollos | Trac Release: | 0.11 |
Description
NoteBox.expand_macro()
performs string concatenation to construct a div element, as result it is possible to inject javascript into the page and have it executed. The following invocation demonstrates this:
[[NoteBox("></div><script type="text/javascript">alert("Javacript Injection Ahoy!")</script><div class="noteboxwarn, Don't care about this text)]]
Attached is a patch that removes the use of StringIO and should make the macro safe for use.
Attachments (1)
Change History (4)
Changed 13 years ago by
Attachment: | th9734_noteboxplugin_dom_injection_fix.patch added |
---|
comment:1 Changed 13 years ago by
Owner: | changed from gruenebe to Ryan J Ollos |
---|---|
Status: | new → assigned |
comment:2 Changed 13 years ago by
Priority: | normal → high |
---|---|
Severity: | normal → critical |
comment:3 Changed 13 years ago by
Resolution: | → fixed |
---|---|
Status: | assigned → closed |
Note: See
TracTickets for help on using
tickets.
Just to confirm, this was the same issue noted in this mailing list post?