XSS vulnerability in the "move" page action with html/js in the page name

XMLWordPrintable

    • 6

      There is an persistent xss vector in the 'move' page action on a page, where the javascript/html payload is included in the name of the page.

      Steps to reproduce:
      1.create a page named: "''/><video onerror=alert(234234) src=xxx>'kasdfjas'dfasdf

      2. (on the page) click on the "move" option under the tools drop-down menu
      3. see an alert box with the number 234234 in it.

            Assignee:
            Niraj Bhawnani
            Reporter:
            David Black
            Votes:
            0 Vote for this issue
            Watchers:
            3 Start watching this issue

              Created:
              Updated:
              Resolved: