Stored XSS in Document Title
Medium
L
Localize
Submitted None
Actions:
Reported by
thd3rboy
Vulnerability Details
Technical details and impact analysis
Summary :
Stored attacks are those where the injected script is permanently stored on the target servers, such as in a database, in a message forum, visitor log, comment field, etc. The victim then retrieves the malicious script from the server when it requests the stored information. Stored XSS is also sometimes referred to as Persistent or Type-I XSS.
Vulnerable URL : https://app.localizestaging.com/documents
Payload XSS :
"><img src=x onerror=alert(document.domain)>
Step to Reproduces :
1. Login to your account
2. Create Project
3. What are you translating? (select documents)
4. Upload Document
5. Input XSS payload in Document Title = "><img src=x onerror=alert(document.domain)>
6. Save it
7. XSS triggered
## Impact
Can steal Cookie, Can run javascript code, and get information sensitive
Report Details
Additional information and metadata
State
Closed
Substate
Resolved
Bounty
$50.00
Submitted
Weakness
Cross-site Scripting (XSS) - Generic