HTML Injection Leads To Open Redirect in omeka/omeka-s
Valid
Reported on
Jul 27th 2023
Description
HTML injection is possible in the Installation title parameter, which leads to Open Redirect when clicked.
Proof of Concept Open Redirect
- Login as Admin
- Navigate to settings
- Edit the Installation title and set it to:
<a href=https://evil.com>Click Me</a>
- Save Changes
- Click the Click Me text on the top left of the page
Screenshots
Impact
The combination of an open redirect vulnerability and HTML injection can lead to phishing attacks, malware distribution, and compromised user data.
Occurrences
We are processing your report and will contact the
omeka/omeka-s
team within 24 hours.
2 months ago
M0ck3d modified the report
2 months ago
M0ck3d modified the report
2 months ago
M0ck3d modified the report
2 months ago
M0ck3d modified the report
2 months ago
M0ck3d modified the report
2 months ago
M0ck3d modified the report
2 months ago
M0ck3d modified the report
2 months ago
M0ck3d modified the report
2 months ago
M0ck3d modified the report
2 months ago
M0ck3d modified the report
2 months ago
We have contacted a member of the
omeka/omeka-s
team and are waiting to hear back
2 months ago
M0ck3d modified the report
2 months ago
The researcher's credibility has increased: +7
@zerocrates @maintainer I noticed that the fix for this was committed last week. Would it be possible to assign a CVE and publish this vulnerability ? Thank you kindly!
We just have to get our ducks in a row for a release. It should be pretty soon.
The fix bounty has been dropped
This vulnerability has been assigned a CVE
SettingForm.php#L130-L142
has been validated
to join this conversation