XSS in hello.js
Critical severity
GitHub Reviewed
Published
Jan 13, 2021
to the GitHub Advisory Database
•
Updated Sep 12, 2023
Description
Published by the National Vulnerability Database
Oct 6, 2020
Reviewed
Jan 13, 2021
Published to the GitHub Advisory Database
Jan 13, 2021
Last updated
Sep 12, 2023
This affects the package hello.js before 1.18.6. The code get the param oauth_redirect from url and pass it to location.assign without any check and sanitisation. So we can simply pass some XSS payloads into the url param oauth_redirect, such as
javascript:alert(1)
.References