Skip to content

Conversation

@dmzoneill
Copy link

fixes #176 — adds htmlspecialchars encoding to prevent xss in form attributes.

the extdisplay parameter was being output directly into the data-fpbx-delete attribute without sanitization across three views. an attacker could craft a url with embedded javascript that would execute in an admin's session.

changed all instances to use htmlspecialchars with ENT_QUOTES to properly escape any html/js payloads in the parameter.

tested that the forms still function correctly with normal input and that malicious payloads are now properly escaped in the rendered html.

Added htmlspecialchars() encoding to all instances of the extdisplay
request parameter in form attributes across devices, users, and
extensions views. The parameter was previously output directly into
HTML attributes without sanitization, allowing potential XSS attacks
via crafted URLs.

This closes a reflected XSS vulnerability that could allow attackers
to execute arbitrary JavaScript in admin sessions.
@sangoma-oss-cla
Copy link

CLA assistant check
Thank you for your submission! We really appreciate it. Like many open source projects, we ask that you sign our Contributor License Agreement before we can accept your contribution.
You have signed the CLA already but the status is still pending? Let us recheck it.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

fix: sanitize extdisplay parameter to prevent XSS

1 participant