Advisory: php-decoda: Cross-Site Scripting in Video Tags RedTeam Pentesting discovered a cross-site scripting (XSS) vulnerability in the PHP markup parser Decoda. This allows attackers that should be restricted to the markup supported by Decoda to specify a JavaScript event handler for an iframe tag. Depending on the usage of Decoda, this allows attackers to execute JavaScript code in the context of other users in a web application that uses Decoda. ### Details - Product: php-decoda - Affected Versions: 3.x - Fixed Versions: 3.3.3 - Vulnerability Type: Cross-Site Scripting - Security Risk: High - Vendor URL: `http://milesj.me/code/php/decoda` - Vendor Status: fixed version released - Advisory URL: `https://www.redteam-pentesting.de/advisories/rt-sa-2012-002` - Advisory Status: published - CVE: 2012-3830 - CVE URL: `https://cve.mitre.org/cgi-bin/cvename.cgi?name=2012-3830` ### Introduction Decoda is a lightweight class that extracts and parses a custom markup language; based on the concept of BB code. Decoda supports all the basic HTML tags and manages special features for making links and emails auto-clickable, using shorthand emails and links, and finally allowing the user to add their own code tags. (from Decoda's homepage) ### More Details Decoda supports a directive for videos. For example the Decoda markup \[video="youtube" size="small"\]test\[/video\] creates the following corresponding HTML code (whitespace adjusted): \