
Please wait while updating issue type...
This issue is blocking the next release
Access to this issue is restricted, which means only users with access to internal issues can see this issue.
This issue has been closed with status "Investigating" and resolution "Not determined".
Description
Users with the privilege to post comments can store malicious code in the database or any other persistent media, by entering JavaScript code in the “Post Comment” field located inside all the reported issues. The inserted code will be executed every time the data is retrieved by another user.
How to reproduce
- Look for any issue and open it.
- Click on the “Post comment” button.
- In the “COMMENT” filed, type the following: ">
; check the “SAVE MY CHANGES WITH THIS COMMENT” option and click on the “Create comment” button.
- As you can see, the injected script is executed, displaying an external site.
- Back to the issue where the comment was added and refresh the page to make sure the scrips is persistent.
- Finally, the script is executed again, as a proof that it has been saved in the application’s database.
Attachments0

Subtasks0
Important details
User pain
-
Type of bugNot triaged
-
LikelihoodNot triaged
-
EffectNot triaged
Affected by this issue 0
Times and dates
-
Estimated time No time estimated
-
Time spent No time spent
People involved
-
thnguyen
-
-
zegenie
- Subscribers 1 Click here to show the list of subscribers
Other details
-
-
-
Unknown Not determined
This issue has been deleted
This message will disappear when you reload the page.
Post a comment and get things done
open('https://owasp.org')">;
This issue only exists if the comment uses markdown syntax.