Modify ↓
      
        Opened 14 years ago
Closed 14 years ago
#9734 closed defect (fixed)
DOM injection vulnerability in NoteBox.expand_macro()
| Reported by: | Alex Willmer | Owned by: | Ryan J Ollos | 
|---|---|---|---|
| Priority: | high | Component: | NoteBoxMacro | 
| Severity: | critical | Keywords: | security | 
| Cc: | Ryan J Ollos | Trac Release: | 0.11 | 
Description
NoteBox.expand_macro() performs string concatenation to construct a div element, as result it is possible to inject javascript into the page and have it executed. The following invocation demonstrates this:
[[NoteBox("></div><script type="text/javascript">alert("Javacript Injection Ahoy!")</script><div class="noteboxwarn, Don't care about this text)]]
Attached is a patch that removes the use of StringIO and should make the macro safe for use.
Attachments (1)
Change History (4)
Changed 14 years ago by
| Attachment: | th9734_noteboxplugin_dom_injection_fix.patch added | 
|---|
comment:1 Changed 14 years ago by
| Owner: | changed from gruenebe to Ryan J Ollos | 
|---|---|
| Status: | new → assigned | 
comment:2 Changed 14 years ago by
| Priority: | normal → high | 
|---|---|
| Severity: | normal → critical | 
comment:3 Changed 14 years ago by
| Resolution: | → fixed | 
|---|---|
| Status: | assigned → closed | 
Note: See
        TracTickets for help on using
        tickets.
    



Just to confirm, this was the same issue noted in this mailing list post?