Cross-site Scripting (XSS) - Reflected in phoronix-test-suite/phoronix-test-suite

Valid

Reported on

Sep 7th 2021


✍️ Description

Cross-site Scripting (XSS) refers to client-side code injection attack wherein an attacker can execute malicious scripts into a legitimate website or web application. XSS occurs when a web application makes use of unvalidated or unencoded user input within the output it generates.

The user input GET parameter trigger of event.php is unsanitized resulting reflected cross site scripting.

Remediation

Apply context-dependent encoding and/or validation to user input rendered on a page

Occurrences

References

We created a GitHub Issue asking the maintainers to create a SECURITY.md a year ago
We have contacted a member of the phoronix-test-suite team and are waiting to hear back a year ago
phoronix-test-suite/phoronix-test-suite maintainer marked this as fixed with commit 262d23 a year ago
The fix bounty has been dropped
This vulnerability will not receive a CVE
a year ago

This is unlikely to cause any issues in practice since first getting to that point requires credentials / access key from an account, there is barely any JavaScript used on the site besides for some basic display elements, and most installations being run on private intranets, etc. In any case now htmlspecialchars() is being used when printing that passed variable. Thanks!

to join this conversation