You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Learn more on MITRE.
Summary
Reflected Cross-Site Scripting (XSS) vulnerability of txtdot allows remote attackers to inject arbitrary web scripts via the
/proxy
route.Details
DOMPurify is used for the
/get
route:https://github.com/TxtDot/txtdot/blob/a7fdaf80fdf45abefe83b2eb5135ba112142dc74/src/handlers/distributor.ts#L69-L70
But not for the
/proxy
route:https://github.com/TxtDot/txtdot/blob/a7fdaf80fdf45abefe83b2eb5135ba112142dc74/src/routes/browser/proxy.ts#L6-L17
So it's possible to conduct reflected XSS attacks.
PoC
Impact
Attackers can inject arbitrary web scripts on txtdot website by fooling a victim into visiting a malicious link.