Actions
Bug #10355
closeddiag_ping.php: Potential XSS via Hostname parameter
Start date:
03/18/2020
Due date:
% Done:
100%
Estimated time:
Plus Target Version:
Release Notes:
Affected Version:
All
Affected Architecture:
Description
On diag_ping.php, the hostname isn't fully validated and the output is not encoded, leading to a potential XSS.
Using an input such as the following example demonstrates the problem:
127.0.0.1 <img src='' onerror='alert()'>
Updated by Jim Pingle over 4 years ago
diag_traceroute.php is unaffected but I made the same changes there to be safe.
Updated by Jim Pingle over 4 years ago
- Status changed from Confirmed to Feedback
- % Done changed from 0 to 100
Applied in changeset cc3990a334059018b004c91eeb66c147d8afe83d.
Updated by Jim Pingle over 4 years ago
- Status changed from Feedback to Resolved
Improper input is rejected by validation on 2.4.5.r.20200318.1200
Actions