Bug #35033 | Planetmysql submission form vulnerable to non-persistent XSS | ||
---|---|---|---|
Submitted: | 4 Mar 2008 13:25 | Modified: | 4 Mar 2008 16:39 |
Reporter: | Roland Bouman | Email Updates: | |
Status: | Closed | Impact on me: | |
Category: | MySQL Websites: MySQLForge | Severity: | S2 (Serious) |
Version: | OS: | Any | |
Assigned to: | CPU Architecture: | Any |
[4 Mar 2008 13:25]
Roland Bouman
[4 Mar 2008 14:21]
Lenz Grimmer
Thanks for the report!
[4 Mar 2008 14:26]
Lenz Grimmer
Roland, I commited a fix and updated the website. Can you please retest? Thanks!
[4 Mar 2008 14:39]
Roland Bouman
I can still inject html. The inputs look ok. but there is a 'helpful' message to inform me that the email adres is invalid, and that reports back the invalid email address. I mean this one <div class="feedcontent"> <h3>"Invalid email address '"/>'" etc http://www.planetmysql.org/newfeed.php?new_feed_url=%27&new_feed_language=&new_feed_author... My Personal opinion is that the server side should check these things, obviously. But informing the user is more like a convenience feature that I would place at the client side where possible. You can check for an email address using offline javascript, as you can use regular expression matches. That said - I think it is acceptable to simply not report back the invalid email address.
[4 Mar 2008 16:39]
Lenz Grimmer
Thanks for the feedback, I consider the case closed for now and remove the "private" flag from the report.