Loading HuntDB...

Possible DOM XSS on app.hey.com

High
B
Basecamp
Submitted None
Reported by enigmaticjohn

Vulnerability Details

Technical details and impact analysis

Cross-site Scripting (XSS) - DOM
#Summary: Hello Team, While testing it was observed that on https://app.hey.com/, on Search box there is a possibility of XSS. Although the payload is reflected in the DOM but the CSP blocks the execution of the script, the XSS can happen if the CSP is somehow bypassed. The Subject parameter is vulnerable. Apart from XSS, the HTML injection attack is working pretty straight forward. #Steps To Reproduce: 1. Go to https://app.hey.com 2. Login to your account. 3. Click on 'Write' Mail button. 4. Add the recipient as yourself. 5. In the Subject, add following payload ``` TestPayload&lt;/a&gt;&lt;a href="blocked:alert(1)"&gt;ClickHere&lt;/a&gt; ``` 6. Send the mail. 7. Go to top left corner Search Box and type "**TestPayload**" 8. You will see the mail you sent to yourself, and <a> tag will be there "ClickHere". 9. Click on it, you will see the CSP violation in the Console. 10. Below is the CSP of the page: ``` script-src 'self' https://production.haystack-assets.com stats.hey.com *.braintreegateway.com *.braintree-api.com hcaptcha.com *.hcaptcha.com; object-src 'none'; base-uri 'none'; form-action 'self'; frame-ancestors 'none'; report-uri https://sentry.io/api/1371426/security/?sentry_key=3a5ea420eecc45bd9e1d1c2424683f3a&sentry_environment=production&sentry_release= ``` As seen from the CSP, there might be a possibility of Host whitelists bypass. ## Impact If attacker send such type of mail to a victim and if victim accidentally searches for the same mail then the Script will be executed leading to account takeover. This is possible only if CSP is bypassed.

Report Details

Additional information and metadata

State

Closed

Substate

Resolved

Submitted

Weakness

Cross-site Scripting (XSS) - DOM