Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

XSS issues in OData View #157

Open
yoh1496 opened this issue Feb 8, 2019 · 3 comments · May be fixed by #184
Open

XSS issues in OData View #157

yoh1496 opened this issue Feb 8, 2019 · 3 comments · May be fixed by #184
Assignees
Labels

Comments

@yoh1496
Copy link
Contributor

yoh1496 commented Feb 8, 2019

There are one or more XSS issues in Cell Manager.
I found it in OData View.

Steps of reproducing this problem is below:

  1. Create OData in somewhere of your box.
  2. Open the OData.
  3. Create Entity Type and Add Property to the OData Scheme. (Type: String)
  4. Add an entity which contians below code:
<script type="text/javascript">alert(JSON.parse(sessionStorage.getItem('sessionData')).access_token)</script>

The attacker using this vulnerability can get the user token stored in sessionStorage.

@dixonsiu dixonsiu added the bug label Apr 2, 2019
@yoh1496
Copy link
Contributor Author

yoh1496 commented Apr 2, 2019

There were some changes in past.

Please try below code.

<script type="text/javascript">alert(JSON.parse(sessionStorage.getItem('ManagerInfo')).token)</script>

@dixonsiu
Copy link
Member

dixonsiu commented Apr 2, 2019

Thanks. We will continue fixing them with jQuery's text method.

@dixonsiu dixonsiu self-assigned this Apr 2, 2019
@shimono
Copy link
Member

shimono commented Jul 28, 2022

Related to #89

dixonsiu added a commit to dixonsiu/app-uc-unit-manager that referenced this issue Sep 28, 2022
@dixonsiu dixonsiu linked a pull request Oct 6, 2022 that will close this issue
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

Successfully merging a pull request may close this issue.

3 participants