- edited description
XSS
Hi,
In JIRA Threaded Comments plugin v 1.27.5
XSS vulnerability detected:
Step reproduce:
- Replace base url with what is used in your Jira
- Follow the link
This bug only reproduces if Threaded Comments is enabled
Vulnerability occurs due to the lack of escaping of special characters.
To fix vulnerabilities in data output, it is necessary to encode special characters into their safe counterparts, depending on the output context. In the basic version, convert
Vulnerability occurs due to the lack of escaping of special characters.
To fix vulnerabilities in data output, it is necessary to encode special characters into their safe counterparts, depending on the output context. In this case, convert:
&<>"'
to
&<>"'
Comments (5)
-
reporter -
reporter - edited description
-
repo owner Can you please send a fix as a PR?
-
Hello, i create a PR https://bitbucket.org/vrenjith/jira-threaded-comments/pull-requests/12/fixed-xss-in-comments-servlet/diff
Please, check this as quickly as possible because it’s a critical bug.
-
@Renjith Pillai Any news around that ?
- Log in to comment