XSS on external links in glpi-project/glpi
Valid
Reported on
Oct 3rd 2022
Description
This vulnerability allow for an administrator to create an evil external link.
Proof of Concept
As an admin user
- Go to
http://172.16.128.131/front/link.form.php?id=1
- Create an external link and put has value for the link
javascript:alert(1)
- Assign this link to budgets (example)
As a regular user
- Go to
http://172.16.128.131/front/budget.form.php?id=1
- Click on the links tab
- Click on the external links
XSS triggered
Impact
This vulnerability allow an evil administrator to execute arbitrary javascript on every user that click on links.
We are processing your report and will contact the
glpi-project/glpi
team within 24 hours.
8 months ago
We have contacted a member of the
glpi-project/glpi
team and are waiting to hear back
8 months ago
The researcher has received a minor penalty to their credibility for miscalculating the severity: -1
The researcher's credibility has increased: +7
We have sent a
fix follow up to the
glpi-project/glpi
team.
We will try again in 7 days.
8 months ago
We have sent a
second
fix follow up to the
glpi-project/glpi
team.
We will try again in 10 days.
7 months ago
We have sent a
third and final
fix follow up to the
glpi-project/glpi
team.
This report is now considered stale.
7 months ago
The fix bounty has been dropped
This vulnerability will not receive a CVE
to join this conversation