Loading HuntDB...

Stored Cross-Site scripting in the infographics using links

Medium
I
Infogram
Submitted None
Reported by sp1d3rs

Vulnerability Details

Technical details and impact analysis

Cross-site Scripting (XSS) - Stored
##Description Hello. I discovered, that it is possible to conduct Stored XSS attack in the public infographics pages. Upon pasting the link, we can intercept the request, and change the link source to the malicious - which will result to the Stored XSS ##POC https://infogram.com/step-by-step-chartsgreaterlesssvg-onloadalert1greater-1ggk2694e7dj2n0 Click on the {F230771} You will be XSSed: {F230772} ##Reproduction steps 1. Create some infographic 2. Use `Add media`: {F230779} and type some link, for example, http://google.com 3. Start web debugger, and enable interception mode. 4. Insert the link 5. Catch the request to the ``` https://infogram.com/api/infographics/update/[_your_project_id] ``` and change ``` http://google.com ``` to the ``` blocked:alert(document.domain) ``` {F230780} 6. Execute the request, and make infographic Public 7. Visit it and click the link to ensure that XSS works. ##Suggested fix Check the inserted links on the server side - they must start with the pattern `http[s]://`

Report Details

Additional information and metadata

State

Closed

Substate

Resolved

Submitted

Weakness

Cross-site Scripting (XSS) - Stored