TriplyDB / Yasgui

Yet Another Sparql GUI
https://yasgui.triply.cc
MIT License
190 stars 55 forks source link

Cross-Site Scripting (XSS) vulnerability in "endpoint" input field #220

Open ktk opened 1 year ago

ktk commented 1 year ago

There was a bug bounty event where a company had a look at YASAGUI, they discovered a potential Cross-Site Scripting (XSS) vulnerability in the "endpoint input field. When one submits the following input string to the "endpoint" field:

https://myendpoint.com/query<img/src='x'/onerror='alert(8)'>

YASGUI does not properly sanitize the input and renders the untrusted data as HTML code, which results in the execution of the JavaScript code contained in the onerror attribute.

Steps to Reproduce:

https://myendpoint.com/query<img/src='x'/onerror='alert(8)'>

Submit the input.

BenjaminHofstetter commented 1 year ago

opened an issue here https://github.com/TarekRaafat/autoComplete.js/issues/406

BenjaminHofstetter commented 1 year ago

It's mentioned in the autoComplete doc. https://github.com/TarekRaafat/autoComplete.js/issues/406#issuecomment-1523908072