6.0.0-git
▾
Tasks
New Task
Search
Photos
Wiki
▾
Tickets
New Ticket
Search
Toggle Alerts Log
Help
2021-03-07
History
Attachments
Comment
Watch
Download
Comment on [#14213] Reflected Cross-Site Scripting (XSS)
*
Your Email Address
*
Spam protection
Enter the letters below:
.___ __.. .._.. . [__ (__ \ / | \ / | .__) \/ _|_ \/
Comment
> Hey guys, > > I've found a XSS flaw on a gollem in Horde (5.2.5) application that's > being used has a plugin in roundecube for file management, I only > tried in prod. > > [domain]xplorer/gollem/manager.php?searchfield=%22%22%3E%3Cscript/src=data:,alert(document.cookie)%2b%22&x=0&y=0 > > Variable: searchfield > The payload: ""><script/src=data:,alert(document.cookie)%2b" (With > Chrome XSS-Auditor bypass) > > Input validation in the search field should be enough to stop the attack. > > I can post on the bug mailist if you want. > > Thank You.
Attachment
Watch this ticket
New Ticket
My Tickets
Search
Query Builder
Reports
Saved Queries
Open Bugs
Bugs waiting for Feedback
Open Bugs in Releases
Open Enhancements
Enhancements waiting for Feedback
Bugs with Patches
Enhancements with Patches
Release Showstoppers
Stalled Tickets
New Tickets
Horde 5 Showstoppers