CSS Injection on /embed/ via bgcolor parameter leaks user's CSRF token and allows for XSS
High
C
Chaturbate
Submitted None
Actions:
Reported by
nahamsec
Vulnerability Details
Technical details and impact analysis
Hi there,
There's a CSS injection here: https://chaturbate.com/embed/admin/?bgcolor=%7D*%7Bbackground:red&tour=nvfS&disable_sound=0&campaign=iNSGX
```
body, div#main, div.content, div.block, div.section {margin: 0px; padding: 0px;}
body {min-width:800px;}
div.content {width: 100%;}
body {background: }*{background:red;}
```
This allows an attacker to enumerate the CSRF token. Once the CSRF token is enumerated, we can
#POC
1. Go to `http://d0nut.pythonanywhere.com/demo/token_stealing/7GTt5qD1LD273WYkJyaR/reset`
2. Now go to `http://d0nut.pythonanywhere.com/demo/token_stealing/7GTt5qD1LD273WYkJyaR` and let it do it's magic :)
{F324052}
There are numerous endpoints like `POST /choose_broadcaster_chat_color` where it returns `Content-Type: text/html; charset=utf-8` that could potentially allow a hacker to combine the two for XSS (I haven't gotten that far yet)
**Do you mind asking your HackerOne contact to allow collaboration on your program, so I can invite another researcher that helped me exploit this fully?**
Thanks,
Ben
## Impact
#
Report Details
Additional information and metadata
State
Closed
Substate
Resolved
Submitted
Weakness
Cross-site Scripting (XSS) - DOM