Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

mezzanine xss #1921

Open
deFming opened this issue Apr 23, 2019 · 2 comments
Open

mezzanine xss #1921

deFming opened this issue Apr 23, 2019 · 2 comments
Labels

Comments

@deFming
Copy link

deFming commented Apr 23, 2019

Version: <=4.3.1
My English is not good, the report is translated by Google.
Recurring vulnerabilities:
Vulnerability url: http://127.0.0.1:8000/admin/blog/blogpost/add/
When adding a blog, use Burpsuite to capture the package, modify the title to test<svg/onload=alert(1)> and the content as <svg>
21CB7D45-8A10-4E42-BCF6-F43BA73AB36B
Return http://127.0.0.1:8000/blog/ to trigger the xss
9A9C3CCC-D286-4AB9-87C2-B3E9A3FF99B6
The cause of the vulnerability is due to the description_from_content function of core/models.py, line 184, where the value of title is called, resulting in xss
8F2A6B92-DB86-42CA-9DC0-4D195CB64BBA

@kenbolton
Copy link
Collaborator

Is this what you are describing? https://nvd.nist.gov/vuln/detail/CVE-2018-16632

Resolved by stephenmcd/grappelli-safe@cb1d459

@deFming
Copy link
Author

deFming commented Apr 24, 2019

Is this what you are describing? https://nvd.nist.gov/vuln/detail/CVE-2018-16632

Resolved by stephenmcd/grappelli-safe@cb1d459

No, not the same, the trigger point of this xss is in the 112 line
https://github.com/stephenmcd/mezzanine/blob/master/mezzanine/blog/templates/blog/blog_post_list.html line112
image

@jerivas jerivas added the bug label Sep 24, 2021
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

No branches or pull requests

3 participants