kaltura / server

The Kaltura Platform Backend. To install Kaltura, visit the install packages repository.
https://github.com/kaltura/platform-install-packages
GNU Affero General Public License v3.0
379 stars 174 forks source link

kaltura/server (lastest version)- Cross-Site Scripting (XSS) in "XmlJWPlayer.php" #5303

Closed bestshow closed 7 years ago

bestshow commented 7 years ago

Product:kaltura/server Download: https://github.com/kaltura/server Vunlerable Version: lastest version Tested Version: lastest version Author: ADLab of Venustech

Advisory Details: I have discovered a Cross-Site Scripting (XSS) in “kaltura/server”, which can be exploited to execute arbitrary code. The vulnerability exists due to insufficient filtration of user-supplied data in “entryId” HTTP GET parameter passed to “server-Lynx-12.11.0/admin_console/web/tools/XmlJWPlayer.php” url. An attacker could execute arbitrary HTML and script code in browser in context of the vulnerable website. The exploitation example below uses the "alert()" JavaScript function to see a pop-up messagebox: Poc: http://localhost/.../server-Lynx-12.11.0/admin_console/web/tools/XmlJWPlayer.php?entryId=%22%3E%3Cscript%3Ealert(1);%3C/script%3E%3C%22

kaltura-hooks commented 7 years ago

Hi @bestshow,

Thank for you reporting an issue and helping improve Kaltura!

To get the fastest response time, and help the maintainers review and test your reported issues or suggestions, please ensure that your issue includes the following (please comment with more info if you have not included all this info in your original issue):

For general troubleshooting see: https://github.com/kaltura/platform-install-packages/blob/Jupiter-10.13.0/doc/kaltura-packages-faq.md#troubleshooting-help

If you only have a general question rather than a bug report, please close this issue and post at: http://forum.kaltura.org

Thank you in advance,

jessp01 commented 7 years ago

Hi,

Fixed by this patch: https://github.com/kaltura/server/pull/5304/files. Please patch your local instances accordingly.