Uploaded image for project: 'Service Interaction'
  1. Service Interaction
  2. SI-12

Potential CROSS SITE SCRIPTING (XSS) vulnerability

    XMLWordPrintable

Details

    • ERM Sprint 160, ERM Sprint 161, ERM Sprint 162
    • Bienenvolk
    • Orchid (R1 2023) Bug Fix

    Description

      Overview: html not escaped in URL link field
      Steps to Reproduce:

      1. Log into some FOLIO environment as User X
      2. Click dashboard app
      3. Create a widget and input javascript:alert('xss') to Url link field
      4. Save the dashboard and click Link to app

      Expected Results:

      The javascript should not be executed
      Actual Results:

      The javascript is executed
      Additional Information:
      URL: tested on https://okapi-bugfest-nolana.int.aws.folio.org
      Interested parties:

      Attachments

        Issue Links

          Activity

            People

              ostephens Owen Stephens
              hji Hongwei Ji
              Votes:
              0 Vote for this issue
              Watchers:
              4 Start watching this issue

              Dates

                Created:
                Updated:
                Resolved: