Closed minhquan202 closed 1 month ago
@minhquan202 Thank you for opening a bug report. Unfortunately, the information you have provided is not sufficient for someone else to attempt to reproduce the reported behavior. Remember, each bug report must include detailed steps that someone else can follow on a clean, empty NetBox installation to reproduce the exact problem you're experiencing. These instructions should include the creation of any involved objects, any configuration changes, and complete accounting of the actions being taken. Also be sure that your report does not reference data on the public NetBox demo, as that is subject to change at any time by an outside party and cannot be relied upon for bug reports.
Can you please provide what script you are using and
I just want to inform you that using mark_safe but lacking escape causes the application to have an XSS vulnerability. Let you fix it in the next updates. As for the steps, I have provided. Please read carefully and think about my bug report. Whether you fix this or not has nothing to do with me, this is for your users. All information has been presented by me in my bug report, please read carefully.
Vào Th 4, 25 thg 9, 2024 vào lúc 22:03 Arthur Hanson < @.***> đã viết:
@minhquan202 https://github.com/minhquan202 Thank you for opening a bug report. Unfortunately, the information you have provided is not sufficient for someone else to attempt to reproduce the reported behavior. Remember, each bug report must include detailed steps that someone else can follow on a clean, empty NetBox installation to reproduce the exact problem you're experiencing. These instructions should include the creation of any involved objects, any configuration changes, and complete accounting of the actions being taken. Also be sure that your report does not reference data on the public NetBox demo, as that is subject to change at any time by an outside party and cannot be relied upon for bug reports.
Can you please provide what script you are using and
— Reply to this email directly, view it on GitHub https://github.com/netbox-community/netbox/issues/17596#issuecomment-2374355991, or unsubscribe https://github.com/notifications/unsubscribe-auth/AVH2N6CTD7LTNL5XU26UN4TZYLGDVAVCNFSM6AAAAABOZS6UT6VHI2DSMVQWIX3LMV43OSLTON2WKQ3PNVWWK3TUHMZDGNZUGM2TKOJZGE . You are receiving this because you were mentioned.Message ID: @.***>
Closing as not enough information has been provided. I tried a simple script in name and Link Text and checked it on the Site page and did not see it activating. If reproduction steps can be included as specified in the response above then we can re-open and look at addressing.
ok i will create ticket again and give you more clear information. ok?
Vào Th 5, 26 thg 9, 2024 vào lúc 02:56 Arthur Hanson < @.***> đã viết:
Closing as not enough information has been provided. I tried a simple script in name and Link Text and checked it on the Site page and did not see it activating. If reproduction steps can be included as specified in the response above then we can re-open and look at addressing.
— Reply to this email directly, view it on GitHub https://github.com/netbox-community/netbox/issues/17596#issuecomment-2375131706, or unsubscribe https://github.com/notifications/unsubscribe-auth/AVH2N6GFYAAZCPEHOBDS2UDZYMIPLAVCNFSM6AAAAABOZS6UT6VHI2DSMVQWIX3LMV43OSLTON2WKQ3PNVWWK3TUHMZDGNZVGEZTCNZQGY . You are receiving this because you were mentioned.Message ID: @.***>
Deployment Type
NetBox Cloud
NetBox Version
v4.1.1
Python Version
3.10
Steps to Reproduce
1, Add or Edit a Custom Link with malicious script tags at param Name
2, Access Object Type using Custom Link
3, Immediately boom, Stored XSS is executed
Expected Behavior
spam, csrf token hijacking, combined with other vulnerabilities to create a chain that harms the system
Observed Behavior