Closed
Bug 638563
Opened 14 years ago
Closed 14 years ago
donate.mozilla.org reflected XSS load_locale.ajax.php region_id
Categories
(Websites :: donate.mozilla.org, defect)
Websites
donate.mozilla.org
Tracking
(Not tracked)
VERIFIED
FIXED
People
(Reporter: dchanm+bugzilla, Unassigned)
References
()
Details
(Keywords: wsec-xss, Whiteboard: [blocker][infrasec:xss][ws:high])
Data passed to the region_id parameter in load_locale.ajax.php is not properly sanitized before being displayed to the user. This can be leverage to conduct cross-site scripting attacks by luring a user to a specially crafted URL
The page appears to strip out HTML tags. This particular vector uses the onfocus handler with the new HTML autofocus attribute.
STR.
1. Visit above link in Firefox 4
2. You should get an alert box with 1
Recommended remediation:
Entity encode user supplied data before displaying
Comment 1•14 years ago
|
||
We have rolled a patch to address this.
We fixed the injection, make sure the whole file escapes input properly and returns data with a JSON content-type.
Comment 2•14 years ago
|
||
David, can you confirm this is resolved from the patch. We're trying to get all these bugs resolved for launch.
Thanks!
Updated•14 years ago
|
Severity: normal → blocker
Whiteboard: [infrasec:xss][ws:high] → [blocker][infrasec:xss][ws:high]
Comment 3•14 years ago
|
||
Verified this in stage. All is good here.
Status: NEW → RESOLVED
Closed: 14 years ago
Resolution: --- → FIXED
Updated•14 years ago
|
Status: RESOLVED → VERIFIED
Updated•13 years ago
|
Group: websites-security
Comment 4•12 years ago
|
||
Adding keywords to bugs for metrics, no action required. Sorry about bugmail spam.
Keywords: wsec-xss
You need to log in
before you can comment on or make changes to this bug.
Description
•