Loading HuntDB...

[intensedebate.com] XSS Reflected POST-Based on update/tumblr2/{$id}

Medium
A
Automattic
Submitted None
Reported by fuzzme

Vulnerability Details

Technical details and impact analysis

Cross-site Scripting (XSS) - Reflected
##Summary: Hello, I have found an XSS Reflected POST-Based on `https://www.intensedebate.com/update/tumblr2/{$id}`. The parameter $_POST['txtCode'] is reflected and is not sanitized. To trigger the XSS an attacker need to create a site and invite the victim in their own site and give then full permissions, because the victim needs the `reinstall` functionality to trigger the XSS and the attacker need to know the id of `/update/tumblr2/{$id}`. Vulnerable(s) URL: ``` POST /update/tumblr2/{$id} ``` Vulnerable(s) Parameter(s): ``` $_POST['txtCode']; ``` Payload : ``` </teXtarEa/</scRipt/--!>\x3csVg/<sVg/oNloAd=prompt(document.cookie)//>\x3e ``` ##Steps to reproduce You need two account 1. Login at ```intensedebate.com``` 2. Create your own site at ```intensedebate.com/install```, and follow the instructions (use generic install) 3. Invite the victim account on your own site, and give then the full permissions 4. Setup the XSS POC, download the xss.html and open it with a text editor and change the `{id}` by own site id 5. Login in the second account, and open the xss.html 6. And you will see the XSS pop-up You can also follow me into the video POC. Thank you, good bye. ## Impact A attacker can perform a phishing attack or perform a CORS attack

Report Details

Additional information and metadata

State

Closed

Substate

Resolved

Submitted

Weakness

Cross-site Scripting (XSS) - Reflected