Html Injection and Possible XSS via MathML
Critical
X
X (Formerly Twitter)
Submitted None
Actions:
Reported by
z41b1337_
Vulnerability Details
Technical details and impact analysis
Hi,
I would like to report HTML Injection and possible cross site scripting (XSS) vulnerability using the MathML on Firefox.
Account title of field is vulnerable to Html Injection which can lead an attacker to store javascript using the MathML in Firefox.
Modern Firefox versions allow usage of inline MathML. While other user agents don't support the href attribute for MathML elements (yet), Firefox does and thereby enables passive JavaScript execution. Note that supporting href for MathML elements is a feature - introduced with MathML 3. The same effect can be observed by using xlink:href. The statusline action further enables obfuscation of the actual link target - and in this example hides the JavaScript URI.
Step to reproduce
1- Login to your mopub account.
2- Go to account settings.
3- Click on Edit user settings.
4- Add this payload in Title field
<math href="blocked:alert(1)">CLICKME</math>
<math>
<!-- up to FF 13 -->
<maction actiontype="statusline#http://google.com" xlink:href="blocked:alert(2)">CLICKME</maction>
<!-- FF 14+ -->
<maction actiontype="statusline" xlink:href="blocked:alert(3)">CLICKME<mtext>http://http://google.com</mtext></maction>
</math>
5- Click on Submit Button.
6- HTML link will be stored in account Title.
7- Click on that html link and XSS will be executed in Firefox.
POC
Please see the images in the attachment.
## Impact
The vulnerability allow a malicious user to inject html tags and execute Javascript which could lead to steal user's session
Report Details
Additional information and metadata
State
Closed
Substate
Duplicate
Submitted
Weakness
Cross-site Scripting (XSS) - Generic