In Archery before 1.3, inserting an XSS payload into a project name (either by creating a new project or editing an existing one) will result in stored XSS on the vulnerability-scan scheduling page.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
https://github.com/archerysec/archerysec/issues/338 | third party advisory issue tracking exploit |
https://github.com/archerysec/archerysec/releases/tag/v1.3 | third party advisory release notes |
https://github.com/archerysec/archerysec/compare/archerysec-v1.2...v1.3 | third party advisory release notes |