Closed
Bug 1149389
Opened 10 years ago
Closed 10 years ago
Stored XSS
Categories
(bugzilla.mozilla.org :: General, defect)
Tracking
()
People
(Reporter: abhijeth0423, Unassigned)
References
()
Details
Attachments
(1 file)
(deleted),
image/svg+xml
|
Details |
User Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/41.0.2272.101 Safari/537.36
Steps to reproduce:
While reporting a bug, Attach a file can be exploited for Cross Site Scripting.
The attacker can upload a svg file with script to run a XSS or do a URL redirection.
Actual results:
When the attachment is uploaded and someone clicks it, the user/victim can be XSSed
Expected results:
Kindly Click on the attachment to find the victim being XSSed. Works on all browsers and also on mobile browser.
Group: core-security → bugzilla-security
Component: Untriaged → General
Product: Firefox → bugzilla.mozilla.org
Version: 1.0 Branch → Production
we allow attachments to be rendered by the browser, but server them from a different domain to prevent xss.
see one of the many duplicates of bug 38862 for more information: http://mzl.la/1BZDuXh
Group: bugzilla-security
Status: UNCONFIRMED → RESOLVED
Closed: 10 years ago
Resolution: --- → DUPLICATE
You need to log in
before you can comment on or make changes to this bug.
Description
•