vendor:
Flyspray
by:
Cyril Vallicari / HTTPCS / ZIWIT
5.5
CVSS
MEDIUM
Cross-Site Scripting (XSS)
79
CWE
Product Name: Flyspray
Affected Version From: 1.0-rc4
Affected Version To: 1.0-rc4
Patch Exists: NO
Related CWE:
CPE:
Platforms Tested: Windows 7 x64 SP1, Kali Linux
2017
XSRF Stored FlySpray 1.0-rc4 (XSS2CSRF add admin account)
A vulnerability has been discovered in Flyspray, which can be exploited by malicious people to conduct cross-site scripting attacks. Input passed via the 'real_name' parameter to '/index.php?do=myprofile' is not properly sanitised before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in the context of an affected site. The script is executed on the parameter page and on any page that allows the user to put a comment. This XSS vector allows executing scripts to gather the CSRF token and submit a form to create a new admin.
Mitigation:
To mitigate this vulnerability, ensure that input is properly sanitized before being returned to the user. Implement proper input validation and output encoding to prevent cross-site scripting attacks.