emposha / FCBKcomplete

Jquery facebook like(fancy) multi-select
http://www.emposha.com
383 stars 115 forks source link

Cross-Site Scripting (XSS) - DOM Based #156

Open Arkango opened 2 years ago

Arkango commented 2 years ago

The function addTextItem doesn't properly validate the value, allowing an attacker to perform a Cross-Site Scripting (XSS) - DOM based.

The vulnerable code is the following

code_link

424 var li = $('<li rel="'+value+'" fckb="1">').html(xssDisplay(value));

The value inserted as rel value is not properly sanitized.

If the function is called with the following payload

#"><img onerorr=alert(document.domain) src=x>

The Cross-Site Scripting - DOM based will be performed.

I requested a CVE to report the vulnerability.