Modify ↓
Opened 14 years ago
Closed 14 years ago
#9734 closed defect (fixed)
DOM injection vulnerability in NoteBox.expand_macro()
| Reported by: | Alex Willmer | Owned by: | Ryan J Ollos |
|---|---|---|---|
| Priority: | high | Component: | NoteBoxMacro |
| Severity: | critical | Keywords: | security |
| Cc: | Ryan J Ollos | Trac Release: | 0.11 |
Description
NoteBox.expand_macro() performs string concatenation to construct a div element, as result it is possible to inject javascript into the page and have it executed. The following invocation demonstrates this:
[[NoteBox("></div><script type="text/javascript">alert("Javacript Injection Ahoy!")</script><div class="noteboxwarn, Don't care about this text)]]
Attached is a patch that removes the use of StringIO and should make the macro safe for use.
Attachments (1)
Change History (4)
Changed 14 years ago by
| Attachment: | th9734_noteboxplugin_dom_injection_fix.patch added |
|---|
comment:1 Changed 14 years ago by
| Owner: | changed from gruenebe to Ryan J Ollos |
|---|---|
| Status: | new → assigned |
comment:2 Changed 14 years ago by
| Priority: | normal → high |
|---|---|
| Severity: | normal → critical |
comment:3 Changed 14 years ago by
| Resolution: | → fixed |
|---|---|
| Status: | assigned → closed |
Note: See
TracTickets for help on using
tickets.



Just to confirm, this was the same issue noted in this mailing list post?