Uploaded image for project: 'Xporter for Jira'
  1. Xporter for Jira
  2. XPORTER-2957

Stored XSS via email body text area

    XporterXMLWordPrintable

Details

    • R6.3.0 Sprint 3
    • OK

    Description

      Xporter should be able to handle XSS attack from the email body text area.
      The user will be able to add scripts that may run when we are listing the scheduled reports/post functions actions.

      Cross-site scripting attacks occur when you manage to sneak a script (usually javascript) onto someone else's website, where it can run maliciously.
      XSS is possible when you have user input into a web site. For instance, if I was filling out a web form, and it asked me for templates description, I could enter:

      Template Description: "<svg/onload=alert(1)>"
      

      Attachments

        Issue Links

          Activity

            People

              rmbr Rui Rodrigues
              rmbr Rui Rodrigues
              Votes:
              0 Vote for this issue
              Watchers:
              0 Start watching this issue

              Dates

                Created:
                Updated:
                Resolved:

                Time Tracking

                  Estimated:
                  Original Estimate - Not Specified
                  Not Specified
                  Remaining:
                  Remaining Estimate - 0 minutes
                  0m
                  Logged:
                  Time Spent - 4 hours, 30 minutes
                  4h 30m