Persistent Cross Site Scripting Flaw in User Profiles

XMLWordPrintable

    • Severity 3 - Minor

      NOTE: This bug report is for Confluence Server. Using Confluence Cloud? See the corresponding bug report.

      A persistent cross site scripting flaw exists in user profiles when the user updates his/her Homepage URL from the Atlassian ID system to contain an XSS vector which executes when inserted as a link, and clicked on by the victim.

      1. Visit https://id.atlassian.com/profile/
      2. Update your Homepage URL to something like "javascript:alert(document.cookie);" and then submit the changes
      3. Return to your profile on answer.atlassian.com and see reflected changes to Homepage URL on profile.

      I have also emailed security@atlassian.com to inform them of unvalidated input on Atlassian's main profile system (id.atlassian.com) as I feel that by validating that a user indeed puts in a URL, will prevent flaws such as this one.

              Assignee:
              Dennis Kromhout van der Meer (Inactive)
              Reporter:
              Shubham
              Votes:
              0 Vote for this issue
              Watchers:
              3 Start watching this issue

                Created:
                Updated:
                Resolved: