Persistent Cross Site Scripting Flaw in User Profiles

XMLWordPrintable

    • Severity 3 - Minor

      NOTE: This bug report is for Confluence Server. Using Confluence Cloud? See the corresponding bug report.

      A persistent cross site scripting flaw exists in user profiles when the user updates his/her Homepage URL from the Atlassian ID system to contain an XSS vector which executes when inserted as a link, and clicked on by the victim.

      1. Visit https://id.atlassian.com/profile/
      2. Update your Homepage URL to something like "javascript:alert(document.cookie);" and then submit the changes
      3. Return to your profile on answer.atlassian.com and see reflected changes to Homepage URL on profile.

      I have also emailed security@atlassian.com to inform them of unvalidated input on Atlassian's main profile system (id.atlassian.com) as I feel that by validating that a user indeed puts in a URL, will prevent flaws such as this one.

            Assignee:
            Dennis Kromhout van der Meer (Inactive)
            Reporter:
            Shubham
            Votes:
            0 Vote for this issue
            Watchers:
            3 Start watching this issue

              Created:
              Updated:
              Resolved: