Loading HuntDB...

Stored XSS in Application menu via Home Page Url

Medium
P
Ping Identity
Submitted None

Team Summary

Official summary from Ping Identity

There is a stored XSS vulnerability in the Application List page for the Connections module in https://console-staging.pingone.com/ ## Steps To Reproduce: 1. Login to https://console-staging.pingone.com/ and navigate to Connections / Applications 2. Add a new Application. Pick Native App, pick a name and leave all the defaults. 3. Go to the application list, where your new app should now be visible. 4. Add a home page url and save, and intercept the request. 5. In the intercepted request replace the just added home page url with a XSS payload (for example "https://0-a.nl/<svg/onload=alert(document.domain)>"), and forward the request. ## Result When another user / admin visits this application in the Application List and clicks the pencil to edit, the payload fires. ## Impact If an attacker can control a script that is executed in the victim's browser, then they can typically fully compromise that user. Amongst other things, the attacker can: 1. Perform any action within the application that the user can perform. 2. View any information that the user is able to view. 3. Modify any information that the user is able to modify. 4. Initiate interactions with other application users, including malicious attacks, that will appear to originate from the initial victim user.

Reported by renniepak

Report Details

Additional information and metadata

State

Closed

Substate

Resolved

Submitted

Weakness

Cross-site Scripting (XSS) - Stored