Audit log validation

Disclosed: 2018-08-28 08:07:11 By mur90210 To weblate
None
Vulnerability Details
## Issue ## For the docker image (git clone https://github.com/WeblateOrg/docker.git weblate-docker), the IP address in the audit log (in the user's profile, and in the administration console) can be forged using the `X-Forwarded-For` header during the login process. This does not affect http://demo.weblate.org/. For http://demo.weblate.org/, `User-Agent: '"<b>test` was accepted. This will not lead to XSS issues, but could potentially be an issue if the input is used elsewhere, such as a database query. ## Impact ## Consequence ## When using the docker image, it may be possible to spoof audit log entries. If an account were compromised, it may be more difficult to determine this from the audit log entries.
Actions
View on HackerOne
Report Stats
  • Report ID: 296632
  • State: Closed
  • Substate: resolved
  • Upvotes: 4
Share this report