| タイトル | bufanyun HotGo <= v2.0 Cross Site Scripting |
|---|
| 説明 | A stored Cross-Site Scripting (XSS) vulnerability exists in HotGo ≤ v2.0 at the system notice functionality, where the /admin/notice/editNotice endpoint accepts user-supplied content field without sanitization or validation, stores it directly in the database, and the Vue.js frontend renders this content using v-html without sanitization or validation. As a result, authenticated attackers can inject arbitrary JavaScript that executes in the browsers of users viewing the system notice, potentially leading to session hijacking, credential theft, or malicious actions performed on behalf of victims. Mitigations include implementing HTML sanitization using libraries like DOMPurify, avoiding v-html in favor of safe Vue.js rendering, implementing Content Security Policy (CSP) headers, encoding output context-appropriately, and validating input against a whitelist of allowed HTML tags and attributes. |
|---|
| ソース | ⚠️ https://github.com/CC-T-454455/Vulnerabilities/tree/master/hotgo/vulnerability-2 |
|---|
| ユーザー | Anonymous User |
|---|
| 送信 | 2026年03月16日 04:45 (18 日 ago) |
|---|
| モデレーション | 2026年03月31日 18:13 (16 days later) |
|---|
| ステータス | 承諾済み |
|---|
| VulDBエントリ | 354443 [bufanyun HotGo 1.0/2.0 editNotice Endpoint MessageList.vue クロスサイトスクリプティング] |
|---|
| ポイント | 20 |
|---|