Stored XSS in Public Profile Reviews
None
J
Judge.me
Submitted None
Actions:
Reported by
vj1naruto
Vulnerability Details
Technical details and impact analysis
Summary:
Stored XSS found in public profile review in which we can add product details in shop addition options. In description of shop product we can add data URI XSS in HTML format which is led to XSS once user click on HTML.
In data URI XSS payload is encrypted in base64
Steps To Reproduce:
1. Login with registered username and go to profile.
2. After that click on add recommendation and add product details and in it's description add below payload:
<a href="blocked:text/html;charset=utf-7;base64,PHNjcmlwdD5hbGVydCgiWFNTIik8L3NjcmlwdD4=">Click Here</a>
{ Data URI XSS: blocked:text/html;charset=utf-7;base64,PHNjcmlwdD5hbGVydCgiWFNTIik8L3NjcmlwdD4=
(PHNjcmlwdD5hbGVydCgiWFNTIik8L3NjcmlwdD4=) : <script>alert('XSS')</script> }
3. Now save the form by filling rest columns.
4. If any one views public profile and click on HTML tag, it will trigger XSS.
Proof Of Concept:
Video POC attached
## Impact
Attacker can execute XSS in the victim user using judge platform
Report Details
Additional information and metadata
State
Closed
Substate
Resolved
Bounty
$250.00
Submitted
Weakness
Cross-site Scripting (XSS) - Stored