Audit log validation
None
W
Weblate
Submitted None
Actions:
Reported by
mur90210
Vulnerability Details
Technical details and impact analysis
## Issue ##
For the docker image (git clone https://github.com/WeblateOrg/docker.git weblate-docker), the IP address in the audit log (in the user's profile, and in the administration console) can be forged using the `X-Forwarded-For` header during the login process.
This does not affect http://demo.weblate.org/.
For http://demo.weblate.org/, `User-Agent: '"<b>test` was accepted. This will not lead to XSS issues, but could potentially be an issue if the input is used elsewhere, such as a database query.
## Impact
## Consequence ##
When using the docker image, it may be possible to spoof audit log entries. If an account were compromised, it may be more difficult to determine this from the audit log entries.
Report Details
Additional information and metadata
State
Closed
Substate
Resolved
Submitted
Weakness
Improper Neutralization of HTTP Headers for Scripting Syntax