Stored XSS in "post last edited" option
High
D
Discourse
Submitted None
Actions:
Reported by
luigigubello
Vulnerability Details
Technical details and impact analysis
1. There are two users: **Attacker** and **Victim**.
2. **Attacker** starts a private talk via private message with the **Victim**.
3. **Attacker** send a message to **Victim**, then he edits it or deletes it.
4. **Victim** sees the *yellow pencil*, symbol of the edit.
5. **Victim** clicks on *yellow pencil* to see the edit and the XSS runs.
Other info: the XSS also runs on topic (video PoC #2). You can find my XSS message on this URL:
https://try.discourse.org/t/recommended-reading-for-community-and-foss-enthusiasts/278
It is very dangerous because it can hit many users at the same time.
## Impact
XSS can use to steal cookies, password or to run arbitrary code on victim's browser
The hacker selected the **Cross-site Scripting (XSS) - Stored** weakness. This vulnerability type requires contextual information from the hacker. They provided the following answers:
**URL**
https://try.discourse.org/t/recommended-reading-for-community-and-foss-enthusiasts/278
**Verified**
Yes
Report Details
Additional information and metadata
State
Closed
Substate
Resolved
Bounty
$256.00
Submitted
Weakness
Cross-site Scripting (XSS) - Stored