-
Notifications
You must be signed in to change notification settings - Fork 3
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Cross Site Scripting Vulnerability In Interview Bot #2
Comments
Vulnerability Name: Stored Cross Site Scripting in Profession Field Interview Bot v1.0 was discovered to contain a Cross-Site Scripting (XSS) vulnerability via the "profession" field, allowing an attacker to inject malicious HTML and JavaScript payloads. Affected component(s): Interview Bot web application (version 1.0) Web-based: The vulnerability can be exploited by submitting malicious payloads through the "profession" field on the login page. The injected HTML and JavaScript are rendered and executed in the browser of other users who view the page. Navigate to the Interview Bot web application at: https://technodes2-0.github.io/Interview-Bot/. Session Hijacking: Attackers may steal session cookies or tokens, potentially gaining unauthorized access to users' accounts. Input Validation: Ensure that all user input in the "profession" field is validated and sanitized to strip out or properly encode any HTML, JavaScript, or other potentially dangerous content. |
Vulnerability Name: Prompt Injection Vulnerability in Interview Bot via URL Interview Bot v1.0 was discovered to contain a Prompt Injection vulnerability that can be exploited by manipulating the URL. This issue occurs when the user submits a specially crafted URL with the payload embedded in the query string, which forces the bot to return a specific response, bypassing the expected behavior. Affected component(s): Interview Bot web application (version 1.0) Web-based: The vulnerability can be exploited by submitting a specially crafted URL containing a prompt injection payload in the query string. The bot executes the injected prompt, which alters its response behavior. Navigate to the Interview Bot web application at: https://technodes2-0.github.io/Interview-Bot/. Prompt Injection: The attacker can control the bot's response by injecting arbitrary instructions into the query string, potentially bypassing the intended functionality or gaining unauthorized control over the bot’s behavior. Input Validation: Ensure that all user input, including query parameters in URLs, is validated and sanitized to prevent malicious manipulation. Reject or escape any input that could be interpreted as executable code or prompt instructions. |
Vulnerability Name: Cross-Site Scripting (XSS)
Description:
Cross-Site Scripting (XSS) is a security vulnerability typically found in web applications. It allows an attacker to inject malicious scripts into web pages viewed by other users. These scripts can hijack user sessions, deface websites, or redirect the user to malicious sites.
Impact:
Session hijacking
Data theft (cookies, session tokens)
Defacement of web pages
Malware distribution
Redirection to malicious websites
Step to Reproduce:
1.Open the following URL in your web browser: https://technodes2-0.github.io/Interview-Bot/
2.In the "name" field, input HTML tags like
<img src=x>
along with entering a random profession.3.After logging in, observe the broken image tag indicating the successful injection of HTML.
4.Further, input the following string in the "name" field:
helllo<h1>helo</h1>
5.Note the HTML tags are rendered as plain text.
6.Now, inject a JavaScript payload in the "name" field:
<img src=x onerror=alert("hacked")>
7.After logging in again, observe that the JavaScript payload executes, demonstrating successful XSS.
Recommendation:
Validate and sanitize user inputs to strip out or encode HTML, JavaScript, and other potentially dangerous content.
Encode output to ensure that any user-generated content is treated as plain text rather than executable code.
Implement a strict CSP to mitigate the impact of XSS attacks by restricting the sources from which certain types of content can be loaded.
The text was updated successfully, but these errors were encountered: