Closed
Bug 503980
Opened 15 years ago
Closed 15 years ago
show_bug.cgi doesn't properly escape <!-- inside bug summary
Categories
(Bugzilla :: Creating/Changing Bugs, defect)
Bugzilla
Creating/Changing Bugs
Tracking
()
RESOLVED
FIXED
Bugzilla 3.4
People
(Reporter: Waldo, Assigned: LpSolit)
References
()
Details
Attachments
(1 file)
606 bytes,
patch
|
mkanat
:
review+
|
Details | Diff | Splinter Review |
http://bonsai.mozilla.org/cvsblame.cgi?file=mozilla/webtools/bugzilla/template/en/default/bug/edit.html.tmpl&rev=1.155&mark=359#359 Passing through a comment-start sequence in that manner makes me uneasy, although I can't think of anything truly bad it actually does, absent template mods to make the template XHTML (and be sent with that MIME type).
Comment 2•15 years ago
|
||
Well, maybe not an XSS, come to think of it (since we're probably still escaping other HTML tags? I dunnow) but we should investigate before removing the security restriction.
![]() |
Assignee | |
Comment 3•15 years ago
|
||
IMO, this isn't a bug at all. hideAliasAndSummary() will get a string with unescaped HTML entities in it, but JavaScript is not HMTL, and <!-- has no special meaning to it. This makes the bug INVALID to me, unless someone can prove there is any risk here.
![]() |
Assignee | |
Comment 4•15 years ago
|
||
(16:47:11) LpSolit: Jesse: is foo('<!-- blaba') a problem for JS? (16:48:35) Jesse: inside a script tag? fine in HTML, i think, but not in XHTML (16:48:56) Jesse: only thing you don't want in HTML is "</" (16:50:20) LpSolit: Jesse: but in no way is this a security problem, right? (16:53:15) Jesse: i don't think it is (16:53:31) Jesse: unless some bugzilla users have attempted to use an XHTML mime type (16:54:27) LpSolit: what would be the problem in that case? (16:55:24) Jesse: you could probably insert stuff like <img src=foo onload=pwn /> in the same way
![]() |
Assignee | |
Comment 6•15 years ago
|
||
Escaping "<" fixes the problem seen with Fx 3.6a1 with html5.enable = true, as described in bug 509373. I don't think we need to escape other HTML special characters.
Assignee: create-and-change → LpSolit
Status: NEW → ASSIGNED
Attachment #393496 -
Flags: review?(mkanat)
Attachment #393496 -
Flags: review?(bugzilla)
Comment 7•15 years ago
|
||
Comment on attachment 393496 [details] [diff] [review] patch, v1 Sure, looks fine to me. We really should determine whether or not there's an actual security issue here, and if not, remove this from the security group.
Attachment #393496 -
Flags: review?(mkanat) → review+
Comment 8•15 years ago
|
||
Okay, not a security issue, after investigation.
Group: bugzilla-security
Flags: approval?
Flags: approval3.4?
Target Milestone: --- → Bugzilla 3.4
![]() |
Assignee | |
Updated•15 years ago
|
Attachment #393496 -
Flags: review?(bugzilla)
![]() |
Assignee | |
Updated•15 years ago
|
Flags: approval?
Flags: approval3.4?
Flags: approval3.4+
Flags: approval+
![]() |
Assignee | |
Comment 9•15 years ago
|
||
tip: Checking in Bugzilla/Template.pm; /cvsroot/mozilla/webtools/bugzilla/Bugzilla/Template.pm,v <-- Template.pm new revision: 1.104; previous revision: 1.103 done 3.4.1: Checking in Bugzilla/Template.pm; /cvsroot/mozilla/webtools/bugzilla/Bugzilla/Template.pm,v <-- Template.pm new revision: 1.99.2.2; previous revision: 1.99.2.1 done
Status: ASSIGNED → RESOLVED
Closed: 15 years ago
Resolution: --- → FIXED
You need to log in
before you can comment on or make changes to this bug.
Description
•