XSS vulnerability on Audio and Video parsers

Disclosed: 2017-01-10 10:01:36 By alberto__segura To discourse
High
Vulnerability Details
Just like in the XSS vulnerability on Image parser, there is the same vulnerability on Audio (https://github.com/discourse/onebox/blob/394409ca319cc1a1cd31fefa50c9468c990531a3/lib/onebox/engine/audio_onebox.rb) and Video (https://github.com/discourse/onebox/blob/394409ca319cc1a1cd31fefa50c9468c990531a3/lib/onebox/engine/video_onebox.rb) parsers. A malicious user can include a "fake" audio or video URL with a ' character, allowing him to execute Javascript code. Audio URL example: http://host/path'onerror=alert(1);//k.mp3 Video URL example: http://host/path'onerror=alert(1);//k.mp4 Ask me if you need more info to reproduce the vulnerability. Best regards, Alberto
Actions
View on HackerOne
Report Stats
  • Report ID: 192223
  • State: Closed
  • Substate: resolved
  • Upvotes: 14
Share this report