Skip to content

Releases: boxmeup/Boxmeup

v2.4.6

25 Aug 14:14
c7aa4e9
Compare
Choose a tag to compare

An XSS security vulnerability was reported by Stas Kravchenko. The container title was not being sanitized on output in the container view or print label view and was allowing potential unwanted javascript execution. This has been patched and deployed.

Original report (Aug 23, 2020, 8:10 AM EST):

Details:
Cross-Site Scripting (XSS) attacks are a type of injection, in which malicious scripts are injected into otherwise benign and trusted web sites. XSS attacks occur when an attacker uses a web application to send malicious code, generally in the form of a browser side script, to a different end-user. Flaws that allow these attacks to succeed are quite widespread and occur anywhere a web application uses input from a user within the output, it generates without validating or encoding it.

Payload:
"><img src=x onerror=alert(1)>

PoC:
image

Recommendations:

  • Always encode untrusted data (all parameters which are submitted to the server and then rendered as part of the web page) prior to including it in web pages. The type of encoding should be selected according to the context in which the data is inserted, e.g. HTML element, HTML attribute, etc;
  • HTML encoding should at minimum target the following characters: '(single quote), "(double quote), >(greater than), <(lesser than), &(ampersand), /(forward slash) and \ (backslash) but again this will depend on the context.
  • Validate user input (including all hidden fields) and verify it is of the proper length, type, and range;
  • Input validation should be based on a white-list approach (i.e. the the application should accept and process only expected input) whenever possible;
  • Always implement input validation on the server-side; validation made on the client-side cannot be relied on;
  • It is important to use common and proven output encoding and input validation libraries/functions.

Reference:
https://www.owasp.org/index.php/Cross-site_Scripting_%28XSS%29

v2.4.5: Merge pull request #267 from cjsaylor/remove-status-blog

07 Oct 00:07
Compare
Choose a tag to compare

v2.4.4: Merge pull request #266 from cjsaylor/dockerize

05 Oct 03:23
Compare
Choose a tag to compare

Interface improvements

03 May 20:58
Compare
Choose a tag to compare

Added ability to select a location when adding a container.

Implemented transaction email provider service.

05 Jan 17:08
Compare
Choose a tag to compare

Emails now are sent via a third party email provider (mailgun).

Composer bug fix and password reset fix.

05 Jan 13:33
Compare
Choose a tag to compare
Merge pull request #168 from cjsaylor/2.4.1

2.4.1

Composer support and bug fixes

04 Jan 16:06
Compare
Choose a tag to compare

Dropped support for git submodules in favor of composer.

  • Added support for substring searches.
  • Fixed various display issues.
  • Fixed unauthorized users attempting to access containers not belonging to them from showing an empty container view page (now shows an actual error page with a 403 response code).

See all changes here: #166

Fixed forgot password link

03 Oct 11:57
Compare
Choose a tag to compare
Merge pull request #162 from cjsaylor/2.3.1

Added missing route for forgot password link.

Revamped API to utilize oauth

13 Sep 11:24
Compare
Choose a tag to compare

You can see new instructions for the API at /developer (http://boxmeupapp.com/develoepr).

Updated bootstrap to stable 3.0

29 Aug 04:18
Compare
Choose a tag to compare

Also added spacelabs theme.