You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
In reNgine v1.0, there is Stored Cross-site Scripting while deleting a Scan Engine in the Scan Engine deletion confirmation modal box!
Steps to Reproduce
Visit your reNgine instance, and login to your account.
Head over to the /scanEngine/ endpoint.
Click on "Add New Engine" and write <img src=binit onerror=alert(document.location)> in the Engine name field.
Now, click on the "Add Engine" button to save the changes.
Click on the cross icon under the Action column, which is used for deleting the scan engine.
You will notice that, while displaying "Are you sure you want to delete {Scan_Engine_Name}?", it will render our Scan Engine Name as it is without performing any sort of sanitization, which results in our JavaScript code inside the XSS payload being executed.
This is how this vulnerability can be reproduced.
I have confirmed that this issue can be reproduced as described on a latest version/pull of reNgine: yes
Technical details
Debian 4.19.181-1
The text was updated successfully, but these errors were encountered:
Issue Summary
In reNgine v1.0, there is Stored Cross-site Scripting while deleting a Scan Engine in the Scan Engine deletion confirmation modal box!
Steps to Reproduce
/scanEngine/
endpoint.<img src=binit onerror=alert(document.location)>
in the Engine name field.You will notice that, while displaying "Are you sure you want to delete {Scan_Engine_Name}?", it will render our Scan Engine Name as it is without performing any sort of sanitization, which results in our JavaScript code inside the XSS payload being executed.
This is how this vulnerability can be reproduced.
Technical details
The text was updated successfully, but these errors were encountered: