Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Cross-Site Scripting (XSS) vulnerability in "endpoint" input field #227

Open
yuansec opened this issue Jul 12, 2023 · 0 comments
Open

Cross-Site Scripting (XSS) vulnerability in "endpoint" input field #227

yuansec opened this issue Jul 12, 2023 · 0 comments

Comments

@yuansec
Copy link

yuansec commented Jul 12, 2023

A new XSS in YASGUI .
poc: https://myendpoint.com/queryhttp://test.com'onclick=alert(123);'

YASGUI does not properly sanitize the input and renders the untrusted data as HTML code, which results in the execution of the JavaScript code contained in the onerror attribute.

Steps to Reproduce:

Navigate to the "endpoint" input field of the web application.
Enter the following input string:
https://myendpoint.com/queryhttp://test.com'onclick=alert(123);'

Submit the input.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant