Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[Security Vulnerability] XSS injection in iconify.php #506

Closed
issmirnov opened this issue Aug 26, 2020 · 5 comments
Closed

[Security Vulnerability] XSS injection in iconify.php #506

issmirnov opened this issue Aug 26, 2020 · 5 comments
Labels
Milestone

Comments

@issmirnov
Copy link

Description

Type: Vulnerability

There is a XSS vulnerability in the iconify.php for material design icons.

Sample payload: http://example.wiki/lib/tpl/bootstrap3/iconify.php?icon=mdi-earth-arrow-right.svg&color=%22%3E%3C/path%3E%3Cscript%3Ealert(%27XSS%27)%3C/script%3E%3Cimg%20x=%22. When running chrome, a popup will appear.

Steps to reproduce

  1. Swap out example.wiki to a wiki running latest hogfather and latest boostrap3 template
  2. Click on the payload above
  3. Observer alert pop up with text "XSS"

Expected behavior: iconify.php should not accept raw input from users.

Actual behavior: XSS vulnerability.

Versions

  • [Bootstrap3 Template] Latest release
  • [DokuWiki] Latest Hogfather
  • [Plugins] Not relevant
  • [PHP] 7.4
  • [Browser] Latest Chrome

Screenshots or Logs

Not posting for privacy, I don't want my wiki domain known for a XSS. You can reproduce this yourself.

Analysis

The params array here should perform XSS protection, rather than blindly saving all input variables and then rendering them

@issmirnov issmirnov added the bug label Aug 26, 2020
@issmirnov
Copy link
Author

Tagging @giterlizzi as this is a security vulnerability.

@giterlizzi
Copy link
Owner

giterlizzi commented Aug 26, 2020

@issmirnov Thanks for reporting this issue. You have found this issue using security scanning ?

@issmirnov
Copy link
Author

Yep, I had some automated scans set up against my personal instance, and they flagged this issue.

@issmirnov
Copy link
Author

Given that this is a security issue, will you be able to roll out a new release?

@giterlizzi
Copy link
Owner

Yes, today will be rollout a new release with this and other fixes.
Thanks :)

@giterlizzi giterlizzi added this to the v2020-08 milestone Aug 27, 2020
giterlizzi added a commit to giterlizzi/dokuwiki-plugin-icons that referenced this issue Aug 28, 2020
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

No branches or pull requests

2 participants