Skip to content

Conversation

@Onyx2406
Copy link
Contributor

@Onyx2406 Onyx2406 commented Jul 1, 2023

Fixes Issue

#376

Changes proposed

This PR mitigates a server-side reflected XSS vulnerability in the /alerts// route by sanitizing user inputs before returning them to the webpage. This has been accomplished by using Flask's escape() method on the user input data before adding it to the response.

The affected parameters alert_timestamp, alert_ID, profile_ip, and tw_name are now properly escaped to prevent potential cross-site scripting attacks.

Check List (Check all the applicable boxes)

  • My code follows the code style of this project.
  • My change requires changes to the documentation.
  • I have updated the documentation accordingly.
  • All new and existing tests passed.
  • This PR does not contain plagiarized content.
  • The title of my pull request is a short description of the requested changes.

Note to reviewers

Please ensure the sanitization has no effect on the overall functionality and output of the set_alerts route. If you encounter any issues, let me know and I'll make the necessary adjustments.

@eldraco
Copy link
Collaborator

eldraco commented Jul 4, 2023

This is so good! thanks for the fix! Our first XSS ever! We are testing and will merge soon.

@Onyx2406
Copy link
Contributor Author

Hi there, any updates on this?

# Conflicts:
#	webinterface/analysis/analysis.py
@AlyaGomaa AlyaGomaa changed the base branch from master to develop August 29, 2025 19:42
@AlyaGomaa AlyaGomaa merged commit 68552f7 into stratosphereips:develop Aug 29, 2025
74 checks passed
@AlyaGomaa
Copy link
Collaborator

hey @Onyx2406 Thanks for your PR! merged. 🌟

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants