PLEASE NOTE: These forums are no longer utilized and are provided as an archive for informational purposes only. All support issues will be handled via email using our support ticket system. For more detailed information on this change, please see this blog post.

Reflected Cross-Site Scripting (XSS) Vulnerabilities

  1. parthenon
    Member

    My client is using Qualys to scan their site and their tool is reporting two XSS issues on a form I created.

    One of the issues is with a radio buttons field with 'Enable "other" choice' checked.

    <input name='input_19_other' type='text' value='Male <script>_q_q=random()</script>' onfocus='jQuery(this).prev("input").attr("checked", true); if(jQuery(this).val() == "Other") { jQuery(this).val(""); }' onblur='if(jQuery(this).val().replace(" ", "") == "") { jQuery(this).val("Other"); }' tabindex='104' />

    The other issue is with a hidden input.

    <input type='hidden' name='gform_ajax' value='form_id=7&title=&description= <script>_q_q=random()</script>' />

    Is there a fix for this? Is this a known issue?

    Posted 12 years ago on Wednesday February 29, 2012 | Permalink
  2. Thanks for pointing these out. Let me take a look at it and see what i can do to solve these vulnerabilities. I will keep you posted

    Posted 12 years ago on Tuesday March 6, 2012 | Permalink
  3. I was able to pinpoint and address both of these vulnerabilities. They will be available this afternoon or tomorrow as part of the 1.6.3.2 release.

    Posted 12 years ago on Tuesday March 6, 2012 | Permalink
  4. parthenon
    Member

    Thanks for the fix.
    The Qualys scan is passing now.

    Posted 12 years ago on Thursday March 8, 2012 | Permalink
  5. I'm using Sitelock and they picked up xss vulernabilities on my drop down fields can you help?

    Posted 12 years ago on Monday March 19, 2012 | Permalink