Loading HuntDB...

Stored XSS in Intense Debate comment system

High
A
Automattic
Submitted None
Reported by sodium_

Vulnerability Details

Technical details and impact analysis

Cross-site Scripting (XSS) - Stored
Hi Team, ## _Summary:_ The Intense Debate comment system is vulnerable to stored xss by users , this would allow for atacking admins/users on the blog , ## Platform(s) Affected: * Intense Debate comment system ________________________________________________________________________________________ ________________________________________________________________________________________ ## _Steps To Reproduce:_ 1. Go to **intensedebate.com/moderate/{{-ID-}}** 2. Go to comments > allow images in comments 3. Now go to your blog and add this payload as comment : ```html <img src="https://intensedebate.com/images/a-addblog.png" onload="alert()"> ``` 4. You'll notice the alert will pop as result for the "onload" attribute , ________________________________________________________________________________________ ________________________________________________________________________________________ A helpful video : {F1087899} ## Impact * Stealing cookie and secter tokens * Editing html/css/js content for phishing attacks Thanks for taking your valuable time to read and validate this report

Report Details

Additional information and metadata

State

Closed

Substate

Resolved

Submitted

Weakness

Cross-site Scripting (XSS) - Stored