We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Similar to #1526
This vulnerability was discovered and reported by the below researcher.
Takeshi Kaneko of GMO Cybersecurity by Ierae, Inc.
Vulnerability ID: JVN#06704866
Type of Vulnerability: CWE-79 FitNesse contains a reflected cross-site scripting vulnerability
Affected Product/Version: FitNesse 20240707
Reproduction settings and environment: The vulnerability is exploitable with the default settings.
Reproduction Steps:
Download "fitnesse-standalone.jar" which is the latest version "20240707" of FitNesse from https://fitnesse.org/FitNesseDownload.html.
Run "java -jar fitnesse-standalone.jar -p 3000" to start FitNesse.
Access one of the following URLs: http://localhost:3000/?responder=refactor&searchString="><script>alert(location)</script> http://localhost:3000/?responder=refactor&replacementString="><script>alert(location)</script>」
Confirm that JavaScript "alert(location)" is executed and the XSS occurs.
[Cause of vulnerability]
Possible Impacts: Same impact as general reflected XSS
Workaround: Disable the responder "refactor" in the configuration file. Reference: https://fitnesse.org/FitNesse/UserGuide/AdministeringFitNesse/ConfigurationFile.html
Proof-of-concept code: None
CVSS Scores: CVSSv3 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N/BS:6.1
The text was updated successfully, but these errors were encountered:
Escape user input
087bed6
Fixes unclebob#1533
cab0ab9
No branches or pull requests
Similar to #1526
Vulnerability Report for JVN#06704866 (begins here)
This vulnerability was discovered and reported by the below
researcher.
Takeshi Kaneko of GMO Cybersecurity by Ierae, Inc.
Vulnerability ID:
JVN#06704866
Type of Vulnerability:
CWE-79
FitNesse contains a reflected cross-site scripting vulnerability
Affected Product/Version:
FitNesse 20240707
Reproduction settings and environment:
The vulnerability is exploitable with the default settings.
Reproduction Steps:
Download "fitnesse-standalone.jar" which is the latest version "20240707"
of FitNesse from https://fitnesse.org/FitNesseDownload.html.
Run "java -jar fitnesse-standalone.jar -p 3000" to start FitNesse.
Access one of the following URLs:
http://localhost:3000/?responder=refactor&searchString="><script>alert(location)</script>
http://localhost:3000/?responder=refactor&replacementString="><script>alert(location)</script>」
Confirm that JavaScript "alert(location)" is executed and the XSS occurs.
[Cause of vulnerability]
https://github.com/unclebob/fitnesse/blob/20240707/src/fitnesse/resources/templates/refactorForm.vm#L7
https://github.com/unclebob/fitnesse/blob/20240707/src/fitnesse/resources/templates/refactorForm.vm#L28
https://github.com/unclebob/fitnesse/blob/20240707/src/fitnesse/resources/templates/refactorForm.vm#L11
https://github.com/unclebob/fitnesse/blob/20240707/src/fitnesse/resources/templates/refactorForm.vm#L32
Possible Impacts:
Same impact as general reflected XSS
Workaround:
Disable the responder "refactor" in the configuration file.
Reference: https://fitnesse.org/FitNesse/UserGuide/AdministeringFitNesse/ConfigurationFile.html
Proof-of-concept code:
None
CVSS Scores:
CVSSv3 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N/BS:6.1
Vulnerability Report for JVN#06704866 (ends here)
The text was updated successfully, but these errors were encountered: