[Tracker-discuss] Fwd: [PSRT] Cross-Site Scripting(XSS) vulnerability found on your website

R. David Murray rdmurray at bitdance.com
Mon Jan 6 16:30:59 CET 2014


On Mon, 06 Jan 2014 14:14:25 +0900, "Stephen J. Turnbull" <turnbull at sk.tsukuba.ac.jp> wrote:
> Benjamin Peterson writes:
> 
>  > Not sure if this is interesting.
> 
>  > 2. As soon as we submit the crafted URL, we get an alert box saying XSS.
>  >    URL:
>  >
>  >    http://bugs.python.org/issue?%40columns=status&message_count="><script>alert("XSS")<%2Fscript>&%40action=search
> 
> Sure, this is interesting (it works as advertised for me on Mac OS X
> with Firefox 26.0, and could be used for phishing at least).
> 
> I don't know what, if anything, we can do about it, but if we can
> prevent it without unreasonable effort, we should.

It's "just" a matter of making sure roundup html-escapes values that
it substitutes into error messages.  IOW this is a roundup bug.  But
Ezio is a Roundup dev, so getting a fix pushed upstream once we
have one shouldn't be a problem.

Of course, someone needs to find time to do it...

--David


More information about the Tracker-discuss mailing list