Stored Cross-Site scripting in the infographics using links
Medium
I
Infogram
Submitted None
Actions:
Reported by
sp1d3rs
Vulnerability Details
Technical details and impact analysis
##Description
Hello. I discovered, that it is possible to conduct Stored XSS attack in the public infographics pages.
Upon pasting the link, we can intercept the request, and change the link source to the malicious - which will result to the Stored XSS
##POC
https://infogram.com/step-by-step-chartsgreaterlesssvg-onloadalert1greater-1ggk2694e7dj2n0
Click on the
{F230771}
You will be XSSed:
{F230772}
##Reproduction steps
1. Create some infographic
2. Use `Add media`:
{F230779}
and type some link, for example, http://google.com
3. Start web debugger, and enable interception mode.
4. Insert the link
5. Catch the request to the
```
https://infogram.com/api/infographics/update/[_your_project_id]
```
and change
```
http://google.com
```
to the
```
blocked:alert(document.domain)
```
{F230780}
6. Execute the request, and make infographic Public
7. Visit it and click the link to ensure that XSS works.
##Suggested fix
Check the inserted links on the server side - they must start with the pattern `http[s]://`
Report Details
Additional information and metadata
State
Closed
Substate
Resolved
Submitted
Weakness
Cross-site Scripting (XSS) - Stored