Loading HuntDB...

Stored XSS in Public Profile Reviews

None
J
Judge.me
Submitted None
Reported by vj1naruto

Vulnerability Details

Technical details and impact analysis

Cross-site Scripting (XSS) - Stored
Summary: Stored XSS found in public profile review in which we can add product details in shop addition options. In description of shop product we can add data URI XSS in HTML format which is led to XSS once user click on HTML. In data URI XSS payload is encrypted in base64 Steps To Reproduce: 1. Login with registered username and go to profile. 2. After that click on add recommendation and add product details and in it's description add below payload: <a href="blocked:text/html;charset=utf-7;base64,PHNjcmlwdD5hbGVydCgiWFNTIik8L3NjcmlwdD4=">Click Here</a> { Data URI XSS: blocked:text/html;charset=utf-7;base64,PHNjcmlwdD5hbGVydCgiWFNTIik8L3NjcmlwdD4= (PHNjcmlwdD5hbGVydCgiWFNTIik8L3NjcmlwdD4=) : <script>alert('XSS')</script> } 3. Now save the form by filling rest columns. 4. If any one views public profile and click on HTML tag, it will trigger XSS. Proof Of Concept: Video POC attached ## Impact Attacker can execute XSS in the victim user using judge platform

Report Details

Additional information and metadata

State

Closed

Substate

Resolved

Bounty

$250.00

Submitted

Weakness

Cross-site Scripting (XSS) - Stored