Loading HuntDB...

Double Stored Cross-Site scripting in the admin panel

Medium
G
GSA Bounty
Submitted None
Reported by sp1d3rs

Vulnerability Details

Technical details and impact analysis

Cross-site Scripting (XSS) - Stored
##Description Hello. I discovered a Stored XSS attack vector in the `Custom Domain` field ##POC & Reproduction steps 1. Login to the federalist and go to the some instance `http://localhost:1337/sites/<siteid>/settings` 2. Fill the `Custom Domain` field by the ``` blocked:alert(document.domain) ``` and `Demo domain` ``` blocked:alert(document.domain); ``` (it cannot be the same so we bypass the check by adding `;`) 3. Save and press `View Website` button. You will be XSSed. {F199337} {F199336} 4) Go to the `http://localhost:1337/sites/<siteid>/published` - and press view on the demo site to test second Stored XSS {F199338} ##The impact The XSS requires user interaction (e.g. clicking the button). But still, it is a bad thing. Anyone who gain access here, can conduct stored XSS attack against other admins. ##The root cause & suggested fix The input fields not sanitized properly - it should allow only alphanumeric characters, and dots.

Report Details

Additional information and metadata

State

Closed

Substate

Resolved

Bounty

$300.00

Submitted

Weakness

Cross-site Scripting (XSS) - Stored