Closed
Bug 434554
Opened 17 years ago
Closed 17 years ago
XSS vulnerability in SUMO login
Categories
(support.mozilla.org :: General, defect)
support.mozilla.org
General
Tracking
(Not tracked)
VERIFIED
FIXED
0.6.1
People
(Reporter: bsterne, Assigned: laura)
References
()
Details
(Keywords: wsec-xss, Whiteboard: tiki_test)
Attachments
(1 file)
1.87 KB,
patch
|
laura
:
review+
|
Details | Diff | Splinter Review |
The SUMO login form unsafely uses the "user" URL parameter to populate the username field. It could be used for XSS or website defacement. Example attack URL:
http://support.mozilla.com/tiki-login_scr.php?user=<a+href="javascript:alert(document.cookie)">Click+Me</a>
Assignee | ||
Updated•17 years ago
|
Target Milestone: --- → 0.6.1
Assignee | ||
Updated•17 years ago
|
Assignee: nobody → laura
Comment 1•17 years ago
|
||
It's been over two months. What's the status of fixing this? XSS vulns can be just as bad as any other type of vuln.
Comment 2•17 years ago
|
||
It's targeted to the 0.6.1 milestone, so next week.
Comment 3•17 years ago
|
||
Assignee | ||
Updated•17 years ago
|
Attachment #330969 -
Flags: review+
Assignee | ||
Comment 4•17 years ago
|
||
Updated•16 years ago
|
Group: webtools-security → websites-security
Updated•16 years ago
|
Group: websites-security
Updated•16 years ago
|
Group: websites-security
Comment 5•16 years ago
|
||
Verified FIXED; I now get:
"Log in
Username:
<a href="ja<x>vascript:al<x>ert(document.cookie)">Click Me</a>
Password:"
Status: RESOLVED → VERIFIED
Updated•16 years ago
|
Keywords: push-needed
Whiteboard: tiki_triage
Updated•15 years ago
|
Whiteboard: tiki_triage → tiki_test
Comment 6•12 years ago
|
||
Adding keywords to bugs for metrics, no action required. Sorry about bugmail spam.
Keywords: wsec-xss
Comment 7•9 years ago
|
||
These bugs are all resolved, so I'm removing the security flag from them.
Group: websites-security
You need to log in
before you can comment on or make changes to this bug.
Description
•