Security Fix for Stored-XSS on "HiChat" - huntr.dev#28
Open
huntr-helper wants to merge 7 commits intowayou:masterfrom
Open
Security Fix for Stored-XSS on "HiChat" - huntr.dev#28huntr-helper wants to merge 7 commits intowayou:masterfrom
huntr-helper wants to merge 7 commits intowayou:masterfrom
Conversation
Fixed Stored XSS on Hichat
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
https://huntr.dev/users/d3m0n-r00t has fixed the Stored-XSS on "HiChat" vulnerability 🔨. d3m0n-r00t has been awarded $25 for fixing the vulnerability through the huntr bug bounty program 💵. Think you could fix a vulnerability like this?
Get involved at https://huntr.dev/
Q | A
Version Affected | ALL
Bug Fix | YES
Original Pull Request | 418sec#1
Vulnerability README | https://github.com/418sec/huntr/blob/master/bounties/npm/hichat/1/README.md
User Comments:
📊 Metadata *
Bounty URL: https://www.huntr.dev/bounties/1-npm-hichat
⚙️ Description *
The
HiChatapplication is a simplechatforsmall teamswhich is based on asmall serverwhich helps totrackmessages sent by various users. The project presents astored XSSissue which could lead tosession stealingorHTML/JS injectionin a permanent way, until the victim leaves the chat room.Fixed the stored xss using the sanitize-html module to filter out html tags from the input.
https://www.npmjs.com/package/sanitize-html
💻 Technical Description *
Sanitize-html is a simple sanitizer module, to filter out html tags and sanitize input.
🐛 Proof of Concept (PoC) *
npm inode serverhttp://localhost:3000test"><img/src="x"/onerror="alert(document.domain)">XSS popped !!!🔥 Proof of Fix (PoF) *
Added sanitize-html to sanitize the input and filter out html tags to avoid injecting xss payloads into the

nicknamefield as well as themessagefield. There is no xss after sanitization.👍 User Acceptance Testing (UAT)
The application runs smoothly after the fix, and no more xss. Can now send and receive messages without worrying about
xssordata leakage.