Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

XSS Vulnerability when using filter options #270

Open
Krazian opened this issue Aug 19, 2020 · 2 comments · Fixed by Metro-Records/la-metro-councilmatic#643
Open

XSS Vulnerability when using filter options #270

Krazian opened this issue Aug 19, 2020 · 2 comments · Fixed by Metro-Records/la-metro-councilmatic#643

Comments

@Krazian
Copy link

Krazian commented Aug 19, 2020

This issue happens for all cities that use your product.
Within the /search view, you can use the filter parameters to run Javascript code in an HTML script tag. See the following for an example:

I attempted to do the same on http://philly.councilmatic.org/, but it ended up breaking and showing a Heroku error.

@jeancochrane
Copy link
Contributor

Thanks very much for reporting this vulnerability. We've got a fix open in #271 and will update this issue as soon as we've patched production systems.

@jeancochrane
Copy link
Contributor

We released 2.5.9 to fix this bug. The fix is currently being rolled out to LA Metro, and we're working on logistics to do it for Chicago and New York as well.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging a pull request may close this issue.

3 participants