Loading HuntDB...

Javascript Payload reflected Back in Report Embed Code

Low
I
Infogram
Submitted None
Reported by zubair

Vulnerability Details

Technical details and impact analysis

Cross-site Scripting (XSS) - Stored
1)Create new Report template 2)Spoof its name with payload "></div> My Report <script type="text/javascript">alert(document.cookie);</script><div id=" 3)Visit Back to your library list https://infogram.com/app/#/library 4)Select The Created report and click view on web,Click the Share Button 5)Copy & embed the code somewhere in html file you ll triage the Javascript exceution The Payload is reflected in embed code and can compromise the embed code user's PRivacy. Fix:Report/Project name need to be escaped properly For reproduction of issue use: https://infogram.com/greaterreport-classic-lessdivgreaterlessscriptgreateralerttestlessscriptgreater-1g0gmjzqk1y3p1q

Report Details

Additional information and metadata

State

Closed

Substate

Resolved

Submitted

Weakness

Cross-site Scripting (XSS) - Stored