Loading HuntDB...

HTML Injection possible due to bad filter

Low
V
VK.com
Submitted None
Reported by jackb898

Vulnerability Details

Technical details and impact analysis

Cross-site Scripting (XSS) - Generic
Hello, I have found an area where it may be possible to run certain HTML/JS scripts. TO REPRODUCE: 1. Go to documents 2. Upload anything and edit it 3. On the edit page in tags, enter code without a closing bracket ex. <img src=x 4. Click enter 5. It will be parsed in that area, but after saving it, it won't parse. POTENTIAL: I'm still looking into this, as this could be a possible XSS vuln if I can find vectors without closing brackets that have harmful code. WHY IT WORKS: The reason this works is because your filter only looks for opening AND closing brackets, when it is possible to run code without closing the brackets. Thanks, Kicker

Report Details

Additional information and metadata

State

Closed

Substate

Resolved

Submitted

Weakness

Cross-site Scripting (XSS) - Generic