You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
//line 421functiongetchanbyplat($platform)
{
$userid=$this->common->getUserId();
$sql="select * from ".$this->db->dbprefix('channel')." where active=1 and platform='$platform' and type='system' union select * from ".$this->db->dbprefix('channel')." where active=1 and platform='$platform' and type='user'and user_id=$userid";
$query = $this->db->query($sql);
if ($query!=null&&$query->num_rows()>0) {
return$query->result_array();
}
returnnull;
}
We can see that the $platform variable is used inside the the sql query without sanitization.
So the attacker can use the UNION command inside the platform to join a harmful input to the results of the query.
For example: $platform = 'something' UNION select '<script>alert(document.cookie)<\script>' AS '.
Thus the XSS will happen at echo json_encode($channel);
I recommend to have a check and delete for the character (') in the platform variable.
The text was updated successfully, but these errors were encountered:
Hello,
I would like to report for XSS vulnerability.
In file https://github.com/cobub/razor/blob/2c991aff4a9c83f99e77a03e26056715706f15c0/web/application/controllers/manage/product.php
In file
razor/web/application/models/channelmodel.php
Line 421 in 2c991af
We can see that the $platform variable is used inside the the sql query without sanitization.
So the attacker can use the UNION command inside the platform to join a harmful input to the results of the query.
For example: $platform = 'something' UNION select '<script>alert(document.cookie)<\script>' AS '.
Thus the XSS will happen at
echo json_encode($channel);
I recommend to have a check and delete for the character (') in the platform variable.
The text was updated successfully, but these errors were encountered: