Loading HuntDB...

XSS in GOCD Analytics Plugin

Medium
G
GoCD
Submitted None
Reported by onlyaviv

Vulnerability Details

Technical details and impact analysis

Cross-site Scripting (XSS) - DOM
[gocd/gocd-analytics-plugin (info-message.js#L28)](https://github.com/gocd/gocd-analytics-plugin/blob/c9b5f776539b3eb68dc3177c87b99b40319f8b22/assets/js/pages/info-message.js#L28) is vulnerable to XSS via the `?msg=` parameter. By supplying an attack payload such as `?msg=%3Csvg%2Fonload%3Dalert%28%22XSS%22%29%20%3E`, `<svg/onload=alert("XSS") >` will be injected into the webpage. ```js $(document).ready(function () { const msg = window.location.search.match(/[&?]msg=([^&]+)/); const msgText = msg ? decodeURIComponent(msg[1]) : "No data collected for this metric, cannot generate analytics."; $(document.body).html(Utils.infoMessage(msgText)); }); ``` > `Utils.infoMessage` basically just wraps `msgText` in a `</p>` ## Impact An attacker can run malicious code on servers running this plugin, comprising the integrity and confidentiality of such servers.

Report Details

Additional information and metadata

State

Closed

Substate

Resolved

Submitted

Weakness

Cross-site Scripting (XSS) - DOM