Our pure JavaScript Scheduler component


Post by braincept »

Hello

I just got a bug report from a whitehat hacker regarding the Bryntum scheduler. XSS can be used to steal session cookies and other user information, perform advanced phishing techniques and other browser attacks.

Steps to reproduce:

  1. Create or edit an appointment in the calendar.

  2. Set the title of the appointment to this XSS payload:

"><img src=x onerror=prompt("XSS_Vulnerability")>

  1. Once saved it should trigger the XSS. It can also be triggered when you hover on the event itself due to the pop-up information of the appointment

Is this a know issue?


Post by pmiklashevich »

Thanks for the report! Ticket here: https://github.com/bryntum/support/issues/1541

Pavlo Miklashevych
Sr. Frontend Developer


Post by braincept »

Hi Pavel

Thanks for creating a ticket. This bug was discovered by Judy Magleo <bugbounty@judymagleo.com>. In case you have a bug bounty program, please contact her. I will forward the information about the bug to her too.

Thanks!


Post Reply