Convos is an open source multi-user chat that runs in a web browser. Characters starting with "https://" in the chat window create an <a> tag. Stored XSS vulnerability using onfocus and autofocus occurs because escaping exists for "<" or ">" but escaping for double quotes does not exist. Through this vulnerability, an attacker is capable to execute malicious scripts. Users are advised to update as soon as possible.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
https://blog.pocas.kr/2021/12/30/2021-12-30-s-xss-convos-chat/#Second-vulnerability | third party advisory broken link |
https://github.com/convos-chat/convos/commit/86b2193de375005ba71d9dd53843562c6ac1847c | third party advisory patch |
https://www.huntr.dev/bounties/4532a0ac-4e7c-4fcf-9fe3-630e132325c0/ | exploit third party advisory patch |
https://github.com/convos-chat/convos/security/advisories/GHSA-xmpj-xwm3-vww7 | third party advisory patch |