Skip to content

XSS vulnerability in /includes/prefs.inc.php #14

@JordyZomer

Description

@JordyZomer

Hey,

I would like to report a XSS vulnerability in /includes/prefs.inc.php

If the value of $_POST['key'] is set to some malicious javascript E.G. "<script>alert(document.cookie)</script>" then it will execute this. An attacker can use XSS to send a malicious script to an unsuspecting user. The end user’s browser has no way to know that the script should not be trusted, and will execute the script. Because it thinks the script came from a trusted source, the malicious script can access any cookies, session tokens, or other sensitive information retained by the browser and used with that site.

I couldn't find anywhere else to contact you so this seemed the right way.

I advise you to use htmlspecialchars() with ENT_QUOTES to filter the user-input. Since it looks like this file shouldn't be accessed by users at all it might be worth protecting the file with a .htaccess file.

Kind Regards,

Jordy Zomer

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions