Cross-site Scripting (XSS) - Stored in yogeshojha/rengine
Reported on
Aug 27th 2021
✍️ Description
When a XSS payload is used as the name of a gf pattern, it executes.
🕵️♂️ Proof of Concept
- Name a file <img src=x onerror=alert(document.domain)>.json
- Import the file as a gf pattern at https://127.0.0.1/scanEngine/tool_settings
- Click on the uploaded gf pattern.
💥 Impact
The impact is same as any other Stored XSS vulnerability, but the exploitability is less likely.
Occurrences
This has been fixed, additionally in Nuclei section also, this is fixed.
PR: https://github.com/yogeshojha/rengine/pull/478
@nerrorsec, Thank you for reporting this. Very much appreciated.
Congratulations on your bounty! Thank you for making open-source secure!