-
Bug
-
Resolution: Fixed
-
Highest
-
3.0
-
None
Steps:
- Go to WebDAV Configuration
- Enter '<script>alert("XSS")</script>'
- Click on 'Add new regex' button
The script will be executed. It will continue to be executed whenever a user clicks on the 'Save' button.
This can be done by users in the confluence-admin group, so it could be used by them to gain access to sys-admin actions.
[CONFSERVER-16136] XSS vulnerability can be exploited on the WebDAV Configuration page
Workflow | Original: JAC Bug Workflow v3 [ 2896217 ] | New: CONFSERVER Bug Workflow v4 [ 2988846 ] |
Workflow | Original: JAC Bug Workflow v2 [ 2787325 ] | New: JAC Bug Workflow v3 [ 2896217 ] |
Status | Original: Resolved [ 5 ] | New: Closed [ 6 ] |
Workflow | Original: JAC Bug Workflow [ 2718169 ] | New: JAC Bug Workflow v2 [ 2787325 ] |
Workflow | Original: Confluence Workflow - Public Facing - Restricted v5 - TEMP [ 2380001 ] | New: JAC Bug Workflow [ 2718169 ] |
Workflow | Original: Confluence Workflow - Public Facing - Restricted v5 [ 2270934 ] | New: Confluence Workflow - Public Facing - Restricted v5 - TEMP [ 2380001 ] |
Workflow | Original: Confluence Workflow - Public Facing - Restricted v5.1 - TEMP [ 2216104 ] | New: Confluence Workflow - Public Facing - Restricted v5 [ 2270934 ] |
Workflow | Original: Confluence Workflow - Public Facing - Restricted v5 - TEMP [ 2167620 ] | New: Confluence Workflow - Public Facing - Restricted v5.1 - TEMP [ 2216104 ] |
Workflow | Original: Confluence Workflow - Public Facing - Restricted v5 [ 1925982 ] | New: Confluence Workflow - Public Facing - Restricted v5 - TEMP [ 2167620 ] |
Workflow | Original: Confluence Workflow - Public Facing - Restricted v3 [ 1727903 ] | New: Confluence Workflow - Public Facing - Restricted v5 [ 1925982 ] |
Workflow | Original: CONF Bug Subtask WF (TEMP) [ 1684358 ] | New: Confluence Workflow - Public Facing - Restricted v3 [ 1727903 ] |