Jump to content

XSS on admin settings


Recommended Posts

Posted (edited)

We just noticed an XSS vulnerability when I change the device name to XSS payload

I am at version: 4.6.7.0

Has this already been fixed?

image.thumb.png.aea7e72e670436ea15307beb8ce44a51.png

 

And at url "<embyserver>/web/web/1<XSS payload>"

image.thumb.png.2df9656649e7bb8cc8d5da9312d919b2.png

Edited by zachi40
find more places
Posted

Hello zachi40,

** This is an auto reply **

Please wait for someone from staff support or our members to reply to you.

It's recommended to provide more info, as it explain in this thread:

Thank you.

Emby Team

Posted

Hi, where did you change the device name to xss payload?

Posted
3 hours ago, Luke said:

Hi, where did you change the device name to xss payload?

yes

Posted

Hi, where did you do this?

Posted
1 minute ago, Luke said:

Hi, where did you do this?

I change my iPhone name to "><img src="x" onerror=alert(1)>" .

Then I go to the Admin page (<EMBY>/web/index.html#!/dashboard) ) and XSS is run

Posted

OK we'll take a look at it. Thanks.

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
×
×
  • Create New...