Stored XSS in "Name", "Group Name" & "Title" in GitHub repository polonel/trudesk prior to v1.2.0. This allows attackers to execute malicious scripts in the user's browser and it can lead to session hijacking, sensitive data exposure, and worse.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
https://huntr.dev/bounties/da6d03e6-053f-43b6-99a7-78c2e386e3ed | third party advisory exploit |
https://github.com/polonel/trudesk/commit/4f48b3bb86ba66a0085803591065bb6437e864ec | third party advisory patch |