Please answer some questions before submitting your issue. Thanks!
Which version of XXL-JOB do you using?
2.3.1
Other information
I am writing to report a security vulnerability that has been discovered in the com.xuxueli:xxl-job package, which affects all versions of the package. The vulnerability, identified as CVE-2023-26120 , allows for the successful execution of HTML uploaded payload through the /xxl-job-admin/user/add and /xxl-job-admin/user/update endpoints.
As of now, there are no available patches to address this vulnerability. I suggest that the team takes immediate action to mitigate the risk of potential attacks by implementing the following measures:
3条答案
按热度按时间jc3wubiy1#
你真棒
3okqufwl2#
具体描述可以参考以下链接
https://security.snyk.io/vuln/SNYK-JAVA-COMXUXUELI-3248764
里面给出了一些预防上述问题的建议
jbose2ul3#
谢谢 愿属调皮 @***. …
------------------ 原始邮件 ------------------ 发件人: ***@***.***>; 发送时间: 2023年5月10日(星期三) 中午11:04 收件人: ***@***.***>; 抄送: ***@***.***>; ***@***.***>; 主题: Re: [xuxueli/xxl-job] Security vulnerability in com.xuxueli:xxl-job package (CVE-2023-26120) (Issue #3176) 具体描述可以参考以下链接 https://security.snyk.io/vuln/SNYK-JAVA-COMXUXUELI-3248764 里面给出了一些预防上述问题的建议 How to prevent This section describes the top best practices designed to specifically protect your code: Sanitize data input in an HTTP request before reflecting it back, ensuring all data is validated, filtered or escaped before echoing anything back to the user, such as the values of query parameters during searches. Convert special characters such as , , , , and spaces to their respective HTML or URL encoded equivalents. ?&/<> Give users the option to disable client-side scripts. Redirect invalid requests. Detect simultaneous logins, including those from two separate IP addresses, and invalidate those sessions. Use and enforce a Content Security Policy (source: Wikipedia) to disable any features that might be manipulated for an XSS attack. Read the documentation for any of the libraries referenced in your code to understand which elements allow for embedded HTML. — Reply to this email directly, view it on GitHub, or unsubscribe. You are receiving this because you are subscribed to this thread.Message ID: ***@***.***>