Bug 1366833 - Flask or
Summary: Flask or
Keywords:
Status: CLOSED DUPLICATE of bug 1366844
Alias: None
Product: Fedora
Classification: Fedora
Component: python-werkzeug
Version: rawhide
Hardware: All
OS: All
unspecified
medium
Target Milestone: ---
Assignee: Rick Elrod
QA Contact: Fedora Extras Quality Assurance
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2016-08-13 09:21 UTC by Nearg1e
Modified: 2016-08-17 00:45 UTC (History)
4 users (show)

Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
Clone Of:
Environment:
Last Closed: 2016-08-17 00:45:50 UTC
Type: Bug
Embargoed:


Attachments (Terms of Use)

Description Nearg1e 2016-08-13 09:21:12 UTC
Description of problem:
If a website developed by python-flask run in debug mode,can be XSS by triggering an error。

Version-Release number of selected component (if applicable):
<= 0.11.1

How reproducible:

Steps to Reproduce:
1.For example,code:

from flask import Flask, request
app = Flask(__name__)

@app.route("/xss-debug-test/", methods=['POST'])
def xss_debug_test():
    id = int(request.form['id'])
    return "Hello World!"

if __name__ == "__main__":
    app.run(debug=True)


2.if the hacker posted "id=1</textarea><script>alert(/XSS/)</script>",the JavaScript in payload will be run in client.

Actual results:


Expected results:


Additional info:

Comment 1 Rick Elrod 2016-08-17 00:45:50 UTC

*** This bug has been marked as a duplicate of bug 1366844 ***


Note You need to log in before you can comment on or make changes to this bug.