Fixed
Details
Assignee
isaac linisaac linReporter
Darius JazayeriDarius JazayeriComplexity
LowDesignated Committer
Ian BacherIan BacherOriginal estimate
Time tracking
4h loggedFix versions
Affects versions
Priority
Could
Details
Details
Assignee
isaac lin
isaac linReporter
Darius Jazayeri
Darius JazayeriComplexity
Low
Designated Committer
Ian Bacher
Ian BacherOriginal estimate
Time tracking
4h logged
Fix versions
Affects versions
Priority
Created March 21, 2013 at 10:49 AM
Updated April 5, 2022 at 7:50 PM
Resolved April 5, 2022 at 7:50 PM
This XSS reflection security risk was discovered during the January 2013 FlossHack event and credited to Kevin Jacobs:
Pages:
module/reporting/indicators/editCohortDefinitionDimension.form
module/reporting/parameters/queryParameter.form
module/reporting/indicators/manageDimensions.form (executes previously injected Dimension Name scripts)
reporting/indicators/editCohortDefinitionDimension: name and description parameters. XSS
Expected behavior: Wherever a dimension name is outputted to the screen, it should be escaped (XML-escaped or JS-escaped, as relevant)
Observed behavior: If you put a <script> tag in the dimension name, the script will be executed on several pages.
(Surely this same vulnerability exists in other screens in the reporting module, so while doing this ticket, it would be nice to also fix screens related to other reporting definitions. Alternately, look at the screens for other definition types, and create a similar ticket for any vulnerabilities found.)