Closed fgeek closed 8 years ago
Thanks for reporting this. I never got an email... my @esotalk.org address might be broken, I'll look into it.
What should I do to reproduce this?
Tried on my 1.0.0g4 - doesn't work
http://localhost/esoTalk-1.0.0g4/conversations/a'";><img src=no onerror=alert(1)>?search=test
Sorry guys but I can't understand and reproduce the case you were fixing. Anyways - I have applied these changes.
However, I found another XSS bug (with the above commit in place).
Good that you found more issues. @tobscure can you fix that one too?
I was also planning to perform security testing for esoTalk codebase when I have spare time in near future.
@fgeek thanks for all your good intentions @tobscure thank you for still looking into this..
A quick question btw for @tobscure
Thanks @inliquid
@7php nested set model
awesome, thanks @tobscure !
Tried on my 1.0.0g4 - doesn't work
@inliquid I was able to reproduce this cross-site scripting vulnerability without problems e.g. when using logged in administrator account.
@fgeek maybe it wasn't working because of some of my plugins.
@tobscure I have sent email to your Gmail address in your GitHub profile. Did you receive it?
MITRE assigned CVE-2015-9285 for this issue.
Hello,
Cross-site scripting vulnerability has been announced in full disclosure mailing list.
According to this Curesec advisory timeline they were unable to contact you:
Issue can be reproduced with following URL:
Do you have plans to fix this security vulnerability? If you do not plan to fix vulnerabilities in esoTalk please mention it in the README or similar, thank you. As far as I can tell this issue does not yet have CVE identifier assigned. Have you request it?