Open lavie3k opened 1 year ago
Potentially mitigated by #427
@systemcrash Not mitigated by #427, but #435 might at least partially help to mitigate this (but probably not sufficient).
This issue has been automatically marked as stale because it has not had recent activity. It will be closed if no further activity occurs. Thank you for your contributions.
Bug won't fix.
Detail: The Stored Cross-Site Scripting (XSS) vulnerability in the Wireguard Clients function is a security flaw that allows an attacker to inject malicious code into the Wireguard client interface. This vulnerability occurs when user-supplied input, such as client names or descriptions, is not properly sanitized or validated before being displayed on the Wireguard client interface. As a result, an attacker can craft a malicious payload that, when executed by a victim user, can lead to unauthorized access, data theft, or further exploitation.
For more information on XSS vulnerabilities, you can refer to the following resources:
Steps to reproduce:
User
demo
hasmanager
permission to log in to the application and access functionsWireguard Clients
atMain
.Click
New client
to create wireguard clients with theName
parameter value as<script>alert("Hacked!")</script>
. Then pressSave
.Log in to the
admin
administrative account and access theWireguard Clients
function atMain
. The javascript code will execute. Once the victim user accesses the affected page, the injected payload will be executed, potentially leading to successful exploitation.Solution: To mitigate the Stored XSS vulnerability in the Wireguard Clients function, it is crucial to implement proper input validation and output sanitization techniques. Here are a few steps that can help address the issue: