-
Notifications
You must be signed in to change notification settings - Fork 3.5k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
XSS vulnerability #1189
Comments
Looks legit to me. (as in legit threat) |
Do you mean that this is intended as a feature? |
As in the fact it does not escape html is a legitimate security concern. I am not a developer, I simply spotted this and wanted to state that I support that this needs to be fixed. |
@emizzz I agree that it would be great to escape the output passed to I can only imagine one single situation where you would be able to inject here a custom payload and this would be user generated Just meant as a clarification of impact. |
Magnific Popup uses a parameter called
preloader
, which by default is set totrue
.Using a specifically crafted payload (in src URL) two things happen:
Initially, the
text
variable in theupdateStatus
function is set to “Loading…”Then it takes the value passed to it by the default error handling function (which contains the URL).
mfp.updateStatus('error', imgSt.tError.replace('%url%', item.src) );
The problem here is that the
.html()
function does not escape HTML and could be used to inject code.The vulnerability, if exploitable, can even lead to "stored XSS".
The text was updated successfully, but these errors were encountered: