Reflected XSS vector
Medium
G
GoCD
Submitted None
Actions:
Reported by
creased
Vulnerability Details
Technical details and impact analysis
Hello GoCD team,
I noticed a reflected / stored XSS vulnerability vector that could potentially be used to impact security of GoCD users.
- https://www.go.cd/user/upoad/..%2F..%2F
- https://docs.go.cd/current/user/upoad/..%2F..%2F
As you should see, this link is considered as valid by the HTTP service and thus does not cause redirect to root of *.go.cd nor return of an HTTP error code (e.g., 404 not found) as it should be...
Such a link can be used to load an unexpected script located on the HTTP server of *.go.cd, eventually uploaded by user (see screenshot)
Please let me know if you need more information!
Looking forward!
Report Details
Additional information and metadata
State
Closed
Substate
Resolved
Submitted
Weakness
Cross-site Scripting (XSS) - Generic