You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
The input string in the cloud tag page is not properly sanitized. This allows the </title> tag to be prematurely closed, leading to a reflected Cross-Site Scripting (XSS) vulnerability.
Details
In the following page: https://demo.shaarli.org/tags/cloud?do=tagcloud&searchtags=testxss
the searchtags parameter is reflected inside the <title> tag without proper sanitization. By injecting a payload like testxss</title>, an attacker can break out of the <title> context and inject arbitrary HTML or JavaScript into the page.
This vulnerability represents a Reflected XSS issue, which can be exploited by an attacker to perform actions on behalf of other users or steal sensitive data.
The product receives input from an upstream component, but it does not neutralize or incorrectly neutralizes special characters such as <, >, and & that could be interpreted as web-scripting elements when they are sent to a downstream component that processes web pages.
Learn more on MITRE.
Summary
The input string in the cloud tag page is not properly sanitized. This allows the </title> tag to be prematurely closed, leading to a reflected Cross-Site Scripting (XSS) vulnerability.
Details
In the following page:
https://demo.shaarli.org/tags/cloud?do=tagcloud&searchtags=testxss
the searchtags parameter is reflected inside the <title> tag without proper sanitization. By injecting a payload like testxss</title>, an attacker can break out of the <title> context and inject arbitrary HTML or JavaScript into the page.
PoC
Visit the following URL:
tag after breaking out of the <title> element.
https://demo.shaarli.org/tags/cloud?do=tagcloud&searchtags=testxss%3C/title%3E%3Cimg%20src=X%20onerror=alert(1)%3E
This triggers a JavaScript alert via an injected
Impact
This vulnerability represents a Reflected XSS issue, which can be exploited by an attacker to perform actions on behalf of other users or steal sensitive data.
shaarli-.0.14.0-Reflected-xss-via-searchtags.mp4