stored xss in https://www.smule.com
High
S
Smule
Submitted None
Actions:
Reported by
hami
Vulnerability Details
Technical details and impact analysis
hi team ,
I found a stored xss in www.smule.com
**Summary:** [add summary of the vulnerability]
The most damaging type of XSS is Stored XSS (Persistent XSS). An attacker uses Stored XSS to inject malicious content (referred to as the payload), most often JavaScript code, into the target application. If there is no input validation, this malicious code is permanently stored (persisted) by the target application, for example within a database. For example, an attacker may enter a malicious script into a user input field such as a blog comment field or in a forum post.
When a victim opens the affected web page in a browser, the XSS attack payload is served to the victim’s browser as part of the HTML code (just like a legitimate comment would). This means that victims will end up executing the malicious script once the page is viewed in their browser
##details :
parameter vulnerable :Blurb, Location and Name ,this all vulnerable to xss
payload:"></script><script>alert(document.cookie)</script>
payload 2:</script><script>akert(1)</script>
## Steps To Reproduce:
1- login and go to settings
2- add payload to field Blurb
3- refresh page
4- xss will pop up
## poc : in video below
## Impact
Stealing cookies.
can lead to user's Session Hijacking.
can also lead to disclosure of sensitive data.
and more
Report Details
Additional information and metadata
State
Closed
Substate
Resolved
Submitted
Weakness
Cross-site Scripting (XSS) - Stored