|
php.net | support | documentation | report a bug | advanced search | search howto | statistics | random bug | login |
PatchesPull RequestsHistoryAllCommentsChangesGit/SVN commits
[2013-09-30 15:10 UTC] johannes@php.net
[2013-09-30 16:21 UTC] scottmac@php.net
-Status: Open
+Status: Closed
-Assigned To:
+Assigned To: scottmac
[2013-09-30 16:21 UTC] scottmac@php.net
[2013-09-30 16:43 UTC] spaze at exploited dot cz
[2013-09-30 21:28 UTC] johannes@php.net
-Status: Closed
+Status: Assigned
[2013-09-30 21:28 UTC] johannes@php.net
[2013-10-01 13:52 UTC] johannes@php.net
-Status: Assigned
+Status: Closed
[2013-10-01 13:52 UTC] johannes@php.net
|
|||||||||||||||||||||||||||
Copyright © 2001-2025 The PHP GroupAll rights reserved. |
Last updated: Thu Nov 06 14:00:01 2025 UTC |
Description: ------------ When the xhprof_html directory is deployed it makes the site vulnerable to a Reflected XSS attack by not properly escaping the run parameter. 1. find a site with a xhprof_html deployed 2. change the run parameter to include <script>...</script> (e.g. /xhprof/?run=%3Cscript%3Ealert('XSS');%3C/script%3E) 3. load the page 4. notice the JS alert NB: XSS filters in some browsers might block this attack Expected result: ---------------- JavaScript is not executed, input is properly sanitized and/or escaped. Actual result: -------------- JavaScript is executed in the context of the user visiting the page.