Stored Cross-Site Scripting (XSS) in admin interface - responsible disclosure #2080
Unanswered
cx-alex-shleymovich
asked this question in
Q&A
Replies: 2 comments 8 replies
-
Did you try [email protected] ? This is the email address listed for security issues in the README.md (I'm not on the core team - @henri-hulski is possibly the person to contact) |
Beta Was this translation helpful? Give feedback.
6 replies
-
Should be fixed now. |
Beta Was this translation helpful? Give feedback.
2 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
-
Hi,
I'm a security analyst at Checkmarx CxResearch group, a global software security company focused on promoting safer code and libraries.
We've discovered a stored XSS vulnerability in Mezzanine and would like to share a detailed report privately. Unfortunately, the email in the README is no longer valid.
Could you please provide a current email address for this disclosure? We tried [email protected] from PyPI but received no response.
cc: @molokov @kenbolton @jerivas @stephenmcd
Thank you in advance!
Beta Was this translation helpful? Give feedback.
All reactions