Closed Bug 1758433 Opened 4 years ago Closed 4 years ago

XSS vulnerability in captive portal detector

Categories

(Firefox :: Untriaged, enhancement)

Firefox 97
enhancement

Tracking

()

VERIFIED INVALID

People

(Reporter: minkhantzaw.personal, Unassigned)

Details

Attachments

(1 file)

Attached file report.md

User Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:97.0) Gecko/20100101 Firefox/97.0

Steps to reproduce:

Ruckus guest portal redirected to the http://detectportal.firefox.com/canonical.html and some parameters are required. Input the script tag in the key parameter to popup with alert() function.

Actual results:

Escape from the script tag which request the user's input and inject some html tag which lead to XSS vulnerability and it worked.

Expected results:

The parameter in the script tag which request user's input should be filter some characters to avoid XSS vulnerability.

Flags: needinfo?(minkhantzaw.personal)
Flags: needinfo?(minkhantzaw.personal)
Status: UNCONFIRMED → RESOLVED
Closed: 4 years ago
Resolution: --- → INVALID
Status: RESOLVED → VERIFIED
Attachment #9266812 - Attachment mime type: text/markdown → text/plain
Group: firefox-core-security
You need to log in before you can comment on or make changes to this bug.

Attachment

General

Creator:
Created:
Updated:
Size: