mirror of
https://github.com/ciur/papermerge.git
synced 2026-04-25 12:05:58 +03:00
[GH-ISSUE #316] Cross-Site Scripting (XSS) in Permission Management #250
Labels
No labels
2.1
3.0
3.0.1
3.0.2
3.0.3
3.0.3
3.1
3.2
3.2
3.3
3.5
3.x
Fixed. Waiting for feedback.
Fixed. Waiting for feedback.
UX
Version 2.1 - alpha
XSS
announcement
beta
blocker
bug
cannot reproduce
confirmed
confirmed
critical
demo
dependencies
deployment
detchnical debt
discussion
docker
documentation
donations
duplicate
enhancement
feature request
frontend
fundraising
good first issue
good issue
help wanted
high
implemented
important
improvement
incomplete
invalid
investigation
kubernetes
low
low impact
medium
medium
medium impact
migration from 2.0
migration from 2.1
missing-language
missing-ocr-language
no-activity
note
ocr
outofscope
packaging
performance
popular request
pull-request
pypi
question
raspberry pi
roadmap
search
security
setup
status
task
technical debt
updates
user xp
version 1.4.0 - demo
will be implemented
will not be implemented
wontfix
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference
starred/papermerge#250
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @l4rm4nd on GitHub (Feb 26, 2021).
Original GitHub issue: https://github.com/ciur/papermerge/issues/316
Originally assigned to: @ciur on GitHub.
Version: Papermerge 2.0rc35
Group names are not properly escaped, which leads to XSS if the permissions of a document are edited.
Steps to reproduce
First, create a new group with the following XSS payload as group name:
Then proceed and upload an example document into the papermerge application.
Select the document, right-click and chose
Permissions.After clicking the
edit,createorviewbutton, the group name's XSS payload is triggered and executed by the browser.Steps to mitigate this issue
As previously, it is recommended to escape all untrusted user input before reflecting or storing the data.
@ciur commented on GitHub (Feb 26, 2021):
@l4rm4nd, thank you for your detailed report. I will take care of XSS fixes!
@ciur commented on GitHub (Feb 28, 2021):
@l4rm4nd, fix is now part of 2.0.0rc38 release
@l4rm4nd commented on GitHub (Mar 8, 2021):
Seems fixed. Cannot reproduce the XSS vulnerability.