Loading HuntDB...

Reflected XSS vector

Medium
G
GoCD
Submitted None
Reported by creased

Vulnerability Details

Technical details and impact analysis

Cross-site Scripting (XSS) - Generic
Hello GoCD team, I noticed a reflected / stored XSS vulnerability vector that could potentially be used to impact security of GoCD users. - https://www.go.cd/user/upoad/..%2F..%2F - https://docs.go.cd/current/user/upoad/..%2F..%2F As you should see, this link is considered as valid by the HTTP service and thus does not cause redirect to root of *.go.cd nor return of an HTTP error code (e.g., 404 not found) as it should be... Such a link can be used to load an unexpected script located on the HTTP server of *.go.cd, eventually uploaded by user (see screenshot) Please let me know if you need more information! Looking forward!

Report Details

Additional information and metadata

State

Closed

Substate

Resolved

Submitted

Weakness

Cross-site Scripting (XSS) - Generic