Reflected XSS vector

Disclosed: 2017-02-22 17:41:20 By creased To gocd
Medium
Vulnerability Details
Hello GoCD team, I noticed a reflected / stored XSS vulnerability vector that could potentially be used to impact security of GoCD users. - https://www.go.cd/user/upoad/..%2F..%2F - https://docs.go.cd/current/user/upoad/..%2F..%2F As you should see, this link is considered as valid by the HTTP service and thus does not cause redirect to root of *.go.cd nor return of an HTTP error code (e.g., 404 not found) as it should be... Such a link can be used to load an unexpected script located on the HTTP server of *.go.cd, eventually uploaded by user (see screenshot) Please let me know if you need more information! Looking forward!
Actions
View on HackerOne
Report Stats
  • Report ID: 190247
  • State: Closed
  • Substate: resolved
  • Upvotes: 8
Share this report