Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

提交的网页链接存在XSS漏洞 #352

Closed
3 tasks
ghost opened this issue Jan 27, 2021 · 2 comments
Closed
3 tasks

提交的网页链接存在XSS漏洞 #352

ghost opened this issue Jan 27, 2021 · 2 comments
Labels

Comments

@ghost
Copy link

ghost commented Jan 27, 2021

如果您想报告错误,请提供以下信息 If you want to report a bug, please provide the following information:

  • 可复现问题的步骤 The steps to reproduce.
    Link字段没有经过严格过滤,虽然直接提交javascript:会被在前面强制加上http://,但是后面的部分没有做过滤,使用引号闭合当前的href和a标签后,可以向页面嵌入任意代码,甚至重写整个页面,带来严重安全危害。
    攻击Payload:
    image
    受攻击的网页效果:
    image

  • 可复现问题的网页地址 A minimal demo of the problem via https://jsfiddle.net or http://codepen.io/pen if possible.
    https://valine.js.org/

  • 受影响的Valine版本、操作系统,以及浏览器信息 Which versions of Valine, and which browser / OS are affected by this issue?
    未测试过老版本,但最新v1.4.14版本存在该问题

@xCss xCss added the bug label Jan 27, 2021
@xCss
Copy link
Owner

xCss commented Jan 27, 2021

收到,将在下个版本中修复,感谢反馈~

@xCss
Copy link
Owner

xCss commented Oct 19, 2021

@xCss xCss closed this as completed Oct 19, 2021
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

No branches or pull requests

1 participant