question-mark
Stuck on an issue?

Lightrun Answers was designed to reduce the constant googling that comes with debugging 3rd party libraries. It collects links to all the places you might be looking at while hunting down a tough bug.

And, if you’re still stuck at the end, we’re happy to hop on a call to see how we can help out.

HTML content injection in developer signup email

See original GitHub issue

Bug description

The application is rendering the user-controlled tags in an unsafe manner which may allow an attacker to inject malicious HTML code.

Reproduction steps

  1. Go to ‘https://developer.bilinfo.net/signup’ (any site would do)
  2. Signup. At the email section enter the victims email and at the name section enter the HTML script mentioned below :- {{ <img src=http://tinypic.com/i/tp-logo.jpg>}} . Submit the form
  3. Navigate to the corresponding email and you’ll notice that the Name which was an HTML script gets rendered into the mentioned Email.
  4. See error

Expected behavior

User input should be HTML-encoded at any point where it is copied into application responses. All HTML meta-characters, including < > " ’ and =, should be replaced with the corresponding HTML entities (< > etc). Application should filter meta characters or HTML tags provided from user input.

Is your portal managed or self-hosted?

Managed

Issue Analytics

  • State:closed
  • Created 3 years ago
  • Comments:13 (4 by maintainers)

github_iconTop GitHub Comments

1reaction
mikebudzynskicommented, Oct 19, 2020

It will be rolled out with the main API Management service release - you can monitor the link from my previous comment for release notes. We’re still preparing for the roll-out.

1reaction
mikebudzynskicommented, Sep 29, 2020

@CosminLazar This change will be included in the next backend release. You can monitor https://aka.ms/apim/releases for release notes.

Read more comments on GitHub >

github_iconTop Results From Across the Web

Don't let your users get pwned via email HTML injection - Twilio
Learn how to prevent HTML injection into your emails and protect your users from bad actors!
Read more >
How to prevent HTML email injection in Python web apps - r2c
HTML injection in emails can lead to attackers phishing from legitimate domains. Make sure your email content is escaped. Read the documentation ...
Read more >
HTML Injection Tutorial: Types & Prevention with Examples
HTML Injection is just the injection of markup language code to the document of the page. Stealing other person's identity may also happen ......
Read more >
Weaponizing Email Content Injection – Speer Case Study
Here we can inject arbitrary HTML content to an arbitrary recipient by including HTML code in a username. For example, if we register...
Read more >
HTML injection in email template (#54697) · Issues - GitLab
This leads to HTML injection in email template and allows attacker to rewrite original template into a phishing one which will be sent...
Read more >

github_iconTop Related Medium Post

No results found

github_iconTop Related StackOverflow Question

No results found

github_iconTroubleshoot Live Code

Lightrun enables developers to add logs, metrics and snapshots to live code - no restarts or redeploys required.
Start Free

github_iconTop Related Reddit Thread

No results found

github_iconTop Related Hackernoon Post

No results found

github_iconTop Related Tweet

No results found

github_iconTop Related Dev.to Post

No results found

github_iconTop Related Hashnode Post

No results found