Stored XSS in Intense Debate comment system
High
A
Automattic
Submitted None
Actions:
Reported by
sodium_
Vulnerability Details
Technical details and impact analysis
Hi Team,
## _Summary:_
The Intense Debate comment system is vulnerable to stored xss by users , this would allow for atacking admins/users on the blog ,
## Platform(s) Affected:
* Intense Debate comment system
________________________________________________________________________________________
________________________________________________________________________________________
## _Steps To Reproduce:_
1. Go to **intensedebate.com/moderate/{{-ID-}}**
2. Go to comments > allow images in comments
3. Now go to your blog and add this payload as comment :
```html
<img src="https://intensedebate.com/images/a-addblog.png" onload="alert()">
```
4. You'll notice the alert will pop as result for the "onload" attribute ,
________________________________________________________________________________________
________________________________________________________________________________________
A helpful video :
{F1087899}
## Impact
* Stealing cookie and secter tokens
* Editing html/css/js content for phishing attacks
Thanks for taking your valuable time to read and validate this report
Report Details
Additional information and metadata
State
Closed
Substate
Resolved
Submitted
Weakness
Cross-site Scripting (XSS) - Stored