[ZBX-3835] Cross Site Scripting Vulnerability Created: 2011 May 23 Updated: 2017 May 30 Resolved: 2011 Jul 28 |
|
Status: | Closed |
Project: | ZABBIX BUGS AND ISSUES |
Component/s: | Frontend (F) |
Affects Version/s: | None |
Fix Version/s: | 1.8.6 |
Type: | Incident report | Priority: | Minor |
Reporter: | Damian Tommasino | Assignee: | Unassigned |
Resolution: | Fixed | Votes: | 0 |
Labels: | None | ||
Remaining Estimate: | Not Specified | ||
Time Spent: | Not Specified | ||
Original Estimate: | Not Specified | ||
Environment: |
Any |
Attachments: |
![]() ![]() |
Description |
The acknow.php page is vulnerable to reflected XSS attacks. The following section of code doesn't sanitize data properly: if(isset($_REQUEST['saveandreturn'])) { $url = new CUrl(urldecode($_REQUEST['backurl'])); jsRedirect($url->getUrl()); exit(); }The $_REQUEST['backurl'] parameter can be manipulated to perform the XSS attack. Using a proxy capture the parameters request and replace the backurl parameter with the following: </script><script>alert('XSS');</script> (see attachment for PoC). Fix: Sanitze the backurl request parameter and don't assume the user is going to leave the <url>.php in place |
Comments |
Comment by Alexey Fukalov [ 2011 Jul 14 ] |
dev branch: svn://svn.zabbix.com/branches/dev/ZBX-3835 |
Comment by Alexey Fukalov [ 2011 Jul 28 ] |
svn://svn.zabbix.com/branches/1.8 -r20789 |