Cross-site Scripting (XSS) - Stored in namelessmc/nameless
Valid
Reported on
Aug 28th 2021
✍️ Description
Stored XSS in google analytics.
🕵️♂️ Proof of Concept
- goto 'http://localhost/Nameless/index.php?route=/panel/core/seo/' logged in as admin.
- enter "G-XXXXXXXX'); javascript:alert(1); <!--" (without quotes) into google analytics submission.
- Click Submit
- View homepage
side note: entering in "><script>alert(1);</script> instead will cause any admin who visits the SEO page to have the java script activated on them.
💥 Impact
With this vulnerability, You can run arbitrary java script on all users.
We have contacted a member of the
namelessmc/nameless
team and are waiting to hear back
2 years ago
a fix for this would be to use getPurified as seen below for vulnerable line:
$configuration->set('Core', 'ga_script', Output::getPurified(Input::get('analyticsid')));
2 years ago
to join this conversation