-
Notifications
You must be signed in to change notification settings - Fork 766
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Cross-Site Scripting header.tag #1521
Comments
Turns out the values are displayed other places as well and the closing
|
Is there any plan to address this vulnerability? |
This should be simple to fix in the class |
This seems to have been fixed by #1526 , please confirm |
We have looked into both proposed fixes (#1527 & #1526) - it would seem that we both escape the scaffolding of the JSON rather than just the content of the individual elements/properties. @irbishop If you would like to submit an alternative fix through our platform (https://huntr.dev) - we would love to reward you for this! |
@JamieSlome - I submitted my patch #1527 but never heard anything except the invitation to submit through the bug bounty board. After looking at the board I decided against signing up because it required read/write access for pretty much everything related to all public repos, e.g. hooks and deployment keys; seemed overly permissive |
@irbishop - thanks for the swift response & update! ⚡ We request the public scope so that we can fork a repository on behalf of the user - through the bug bounty platform. Beyond this, we do not store nor use any of the other functionalities in the public scope. Unfortunately, GitHub does not offer a lesser scope that provides only write access (i.e. forking a repo only). Hope this helps! 👍 |
Hi, was this issue already addressed ? please note that it was assigned CVE-2020-5497 |
header.tag
appears to be vulnerable to XSS here:userInfoJson is included in the page and is not encoded so malicious elements could be created. If the string
</script>
appears in userInfoJson, the<script>
element will be closedand a new malicious
<script>
can be created:And the malicious JavaScript is executed:
The text was updated successfully, but these errors were encountered: