Done
Details
Assignee
fookerfookerReporter
Christian PapeChristian PapeSprint
NoneAffects versions
Priority
Medium
Details
Details
Assignee
fooker
fookerReporter
Christian Pape
Christian PapeSprint
None
Affects versions
Priority
PagerDuty
PagerDuty
PagerDuty
Created March 14, 2023 at 9:07 AM
Updated August 18, 2023 at 7:34 PM
Resolved August 18, 2023 at 7:34 PM
While working on issue NMS-15306 I realized, that maybe we have a vulnerability in OpenNMS that may affect each and every form. On a request JSP write the content, but afterwards text enclosed by two curly braces are evaluated by Angular. Strings like
{{constructor.constructor('alert(document.domain)')()}}
will allow XSS-attacks. One way to avoid the evaluation by Angular is to setng-non-bindable
for outputting non-Angular values, but it would be nice to have a global fix for the whole OpenNMS-Web-UI. I found some logic regarding Angular apps inbootstrap.jsp
, but my knowledge about Angular is pretty limited. I hope someone can give input on this and find a way to solve this in a general way for the whole OpenNMS Web-UI.