You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
When publishing an article, replacing the cover image URL with XSS attack POC can launch XSS attacks on all users accessing the homepage, executing arbitrary malicious code on the front-end.
Vulnerability proof
Firstly, Click "add article"
then click 'Save' and use Burpsuite to capture the package
Affected version
tianti 2.3 (latest)
Vulnerability description
When publishing an article, replacing the cover image URL with XSS attack POC can launch XSS attacks on all users accessing the homepage, executing arbitrary malicious code on the front-end.
Vulnerability proof
Firstly, Click "add article"
then click 'Save' and use Burpsuite to capture the package
The contents of the data packet are as follows:
Fill the parameter value of coverImageURL into our XSS attack POC ->
"><img src=1 onerror=alert(1)>
After releasing the package, accessing the front-end homepage of Tianti website was attacked by XSS:
Code analysis
In
~/tianti-2.3/tianti-modules/tianti-module-gateway/src/main/webapp/static/template/banner.js
:Directly concatenate the attack POC into HTML without any processing
Repair suggestions
HTML escape of data input by users and used for display
The text was updated successfully, but these errors were encountered: