Skip to content

XSS vulnerabilities #108

@pshenmic

Description

@pshenmic

Issue

There are number of potential XSS vulnerabilities, for example block by hash does not validate incoming hash data, allowing attacker to include a custom script in it, f.e.:

https://insight.dash.org/insight-api/txs?block=0000000000000034808b113f895f8b20542a240a6ff5aae7554ebb3b6c58dcc1%27%22()%26%25%3Czzz%3E%3CSc
  RiPt%20%3Ealert(9125)%3C/ScRiPt%3E&pageNum=0

Results in

Image

There are probably other unsafe places over the code, here's potential list compose by Claude AI:

  1. Original: common.js:14,17 - Error messages reflected without escaping
  2. 404 Handler: index.js:285 - req.originalUrl reflected in 404 response
  3. Messages: messages.js:29 - Exception messages from Message.verify()
  4. Addresses: addresses.js:120 - Exception messages from Address constructor

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions