Stored XSS in www.learnboost.com via ZIP codes.
A
Automattic
Submitted None
Actions:
Reported by
edoverflow
Vulnerability Details
Technical details and impact analysis
# Summary
---
www.learnboost.com is vulnerable to stored XSS via ZIP codes stored alongside school names in the *Network* panel.
# Browsers Verified In
---
* Mozilla Firefox 58.0b12 (64-bit)
# PoC
---
Visit https://www.learnboost.com/settings/network/search and search for `fro`. My entry will trigger the XSS payload.
```html
"><img src=x onerror=alert(document.domain)>
```
{F249746}
## Impact
I now have stored XSS that triggers whenever someone searches for `fro`. If I were to map the payload to a very common search term (e.g. `aa`) that would increase the likelihood that my payload would fire.
Report Details
Additional information and metadata
State
Closed
Substate
Resolved
Submitted
Weakness
Cross-site Scripting (XSS) - Stored