brysontyrrell / PatchServer

A self-hosted implementation of an external patch source for Jamf Pro 10.2+
http://patchserver.readthedocs.io/en/latest/
MIT License
67 stars 13 forks source link

XSS via JS Injection in "name" #29

Open ecrist opened 4 years ago

ecrist commented 4 years ago

There is a verified XSS vulnerability in the "name" variable for uploaded patch files. There is no input sanitization on the data contained in "name" which allows for injection of javascript code that could be utilized by an attacker.

Further exacerbating this issue is lack of authentication controls in the patch server software.