SwiftnessX
SwiftnessX copied to clipboard
Test Cross-site Scripting Vulnerability
Recently, Gaurav reported a Self-XSS vulnerability in video-link feature and you can find the fix at @TomasBaskys's recent commit: https://github.com/ehrishirajsharma/SwiftnessX/commit/5d0e9298f709e6ccfc2fdea24c7f9e8d5e43420b
However, it was later identified that this self-XSS could be escalated using import feature therefore, we're opening this issue to re-test this fix and find any potential way to bypass it.
Areas to Focus
The only possible way to leverage XSS attack is using import feature (when you try to import other user's library/project) so focus on:
- Import Feature
- Bypass Rules for restricted/specified video host providers
Beside you can also look into other areas, where your JS payloads gets stored and run everytime you open. (Templates, Payloads, etc)
Please focus only on Stored-XSS, any Self-XSS related issue wouldn't be taken at priority, as sanitization part take place at the time of storage so there's no real-way to escalate the Self-XSS
Please use latest version for testing this.
For suggestion / questions / fix, you can comment here. To report any possible way to bypass, please send an email at [email protected]