Details
-
Bug
-
Resolution: Fixed
-
Critical
-
11.10.5
-
software platform
-
Unit
-
Unknown
-
N/A
-
N/A
-
Pull Request accepted
-
Description
Some fileds like "Company" in the user profile editing section, are vulnerables to Cross Site Scripting XSS.
So, inserting for example "<script> alert("XSS Cross Site Scripting in this field !!!"); </script>" in the Company field someone has access to this page can inject malicious code.
An attacker can use XSS to send a malicious script to an unsuspecting user. The end user’s browser has no way to know that the script should not be trusted, and will execute the script. Because it thinks the script came from a trusted source, the malicious script can access any cookies, session tokens, or other sensitive information retained by the browser and used with that site.
**Steps to reproduce the issue**
- Login as admin
- Create a test user
- Open the user profile page (https://localhost/bin/view/XWiki/<user>)
- Click edit button near Personal Information
- Edit Company field and insert for example <script> alert("Hello World!"); </script>
- Save & View and see the XSS in action
Attachments
Issue Links
- blocks
-
XWIKI-9658 XSS in the user profile
- Closed
- depends on
-
XCOMMONS-2016 Add a new escape method that only escape the minimal amount of XML special characters
- Closed
-
XWIKI-17766 Update deprecated method calls to org.xwiki.xml.XMLUtils
- Closed
- is duplicated by
-
XWIKI-18565 Stored XSS
- Closed
- is related to
-
XWIKI-9680 Apostrophes in static list value are encoded on .display()
- Closed
- relates to
-
XWIKI-18038 Livetable "html" field parameter doesn't generate HTML code anymore
- Closed
-
XWIKI-18049 Improve the html escaping mechanism for XSS protection
- Closed
-
XWIKI-18122 Revert object displayer value escaping on 11.10.x
- Closed
- links to