-
-
Notifications
You must be signed in to change notification settings - Fork 469
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Potential Security vulnerability #417
Comments
Thank you for report this, I really hope the UVdesk team can fix asap with emergency priority and give immediately instruction to fix and update UVdesk. Is nice to see someone care about security of the product, thanks again! |
The issue reported here is not open and asking for our account access if we are checking it, which is not acceptable for us to provide account access to them. @ranjit-git can report all issue @ support@uvdesk.com if do not want to public security issues here. |
@papnoisanjeev |
If you are not interested to signup there then I can send you all report over above security mail. |
Yes, I do have maintainer access for the project but can't provide account access. Please send security mail on support@uvdesk.com we will check. |
@papnoisanjeev |
Thank you @ranjit-git |
Hi @PeopleInside @papnoisanjeev , there are still 3 bug need to fix |
@ranjit-git I know and I wrote to the UVdesk team in private some days or week ago. Seems they are busy with some other work and I try to explain that a security vulnerability should be at the first position of the priority because this mean every self-hosted server install can be vulnerable and make server vulnerable. I really hope this security issue will never stay opened for months. |
@papnoisanjeev please fix this issue as soon as possible. |
We have fixed 3 issues out of 6 here and working on other. |
Huntr reporthttps://huntr.dev/bounties/3-uvdesk/community-skeleton/ Fixed here. 2 . Bug : unprivileged user can see all ticket details Already fixed 3 . Bug : Stored xss Fixed here. 4. Bug : Store xss Already fixed 5. Bug: Agent can make xss attack against admin |
1. Bug : privilege escalation bug to add collaborator to ticket |
Hello, @Sanjaybhattwebkul |
Hello , @ranjit-git |
@Sanjaybhattwebkul thanks |
@ranjit-git |
@ranjit-git |
@Sanjaybhattwebkul @papnoisanjeev |
@ranjit-git |
@ranjit-git |
Email address where open link will be send? |
@ranjit-git |
Hi, @akshaywebkul @papnoisanjeev @piyushwebkul @shubhwebkul
Few security vulnerability has been submitted through huntr .
Plz validate them
https://huntr.dev/bounties/1-uvdesk/community-skeleton/
https://huntr.dev/bounties/2-uvdesk/community-skeleton/
https://huntr.dev/bounties/3-uvdesk/community-skeleton/
https://huntr.dev/bounties/4-uvdesk/community-skeleton/
https://huntr.dev/bounties/5-uvdesk/community-skeleton/
https://huntr.dev/bounties/6-uvdesk/community-skeleton/
Report is only visible to repo maintainer and reporter .
The text was updated successfully, but these errors were encountered: