Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Bug report: XSS in "magic wand" for URL encode on mouseover #484

Closed
mehgrmlhmpf opened this issue Jan 30, 2019 · 1 comment
Closed

Bug report: XSS in "magic wand" for URL encode on mouseover #484

mehgrmlhmpf opened this issue Jan 30, 2019 · 1 comment

Comments

@mehgrmlhmpf
Copy link

mehgrmlhmpf commented Jan 30, 2019

Summary

Using the URL encoding with "all characters" works as expected with proper escaping. The "magic wand" however used for automatic decoding triggers an XSS on mouseover.

The automatic decoding via mouseover does not properly sanitize the given input.

The vector requires user interaction and is not persistent. This is most likely unexpected and unwanted behaviour and exploitation is very unlikely.

Verified on Chrome Version 71.0.3578.98 (Official Build) (64-bit) and Mozilla Firefox 64.0.

Example

Using the payload "<script>alert(1234)</script>" as input and "url encode all characters" as recipe the following behaviour can be reproduced. Other Javascript will also be executed.

Script execution is triggered at least by mouseover on the "magic wand".

2019-01-30_19-05
2019-01-30_19-06

@n1474335
Copy link
Member

n1474335 commented Feb 8, 2019

Thanks for raising this. Fixed in #488 and merged in v8.23.3

@n1474335 n1474335 closed this as completed Feb 8, 2019
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants