Details
-
Bug
-
Status: Closed
-
Major
-
Resolution: Done
-
None
-
XRAY 2020 Sprint 5
-
Description
The attacker can create a "save filter", name this filter with a long name, and then add an XSS payload at the end of the name in order not to attract attention. Where the vulnerability is exploited in this way without the need for user interaction, just pressing one button. Show PoC video in attachment.
Attachments
Issue Links
- is cloned by
-
XRAY-6612 Stored XSS at Xray in Test issue by Import Steps issue
- Closed