Device Information (please complete the following information):
- Deployment:
Docker
- SIST2 Version:
3.5.0
Describe the bug
If a file is indexed that has HTML/JS code in its filename, the HTML/JS code will be rendered and executed in the browser once the sist2 frontend is browsed.
Steps To Reproduce
- Index a image file with the filename
Sun'><img src=x onerror=alert(1)>set.jpg
- Browse the sist2 frontend (create if not available yet)
- Experience a JS popup windows with 1
Expected behavior
Filenames are properly sanitized and encoded.
Actual Behavior
No sanitization nor encoding. HTML/JS code is rendered and executed.
Screenshots
Recommendation
https://cheatsheetseries.owasp.org/cheatsheets/Cross_Site_Scripting_Prevention_Cheat_Sheet.html
Device Information (please complete the following information):
Docker3.5.0Describe the bug
If a file is indexed that has HTML/JS code in its filename, the HTML/JS code will be rendered and executed in the browser once the sist2 frontend is browsed.
Steps To Reproduce
Sun'><img src=x onerror=alert(1)>set.jpgExpected behavior
Filenames are properly sanitized and encoded.
Actual Behavior
No sanitization nor encoding. HTML/JS code is rendered and executed.
Screenshots
Recommendation
https://cheatsheetseries.owasp.org/cheatsheets/Cross_Site_Scripting_Prevention_Cheat_Sheet.html