Stored XSS at https://app.smtp2go.com/settings/users/
Medium
S
SMTP2GO
Submitted None
Actions:
Reported by
testerpro
Vulnerability Details
Technical details and impact analysis
Vulnerability :
A. Type:- Cross Site Scripting (Stored)
B. Description:- Stored XSS, also known as persistent XSS, is the more damaging than non-persistent XSS. It occurs when a malicious script is injected directly into a vulnerable web application.
Summary :
When you will create a particular user you will have to enter username and you can enter Xss payload than on webhooks it will fire that XSS.
As the website is not filtering the input provided by the user, that's why this problem is there.
Thank You.
## Steps To Reproduce:
[add details for how we can reproduce the issue]
1. Create an account https://app.smtp2go.com and LOG IN using username and password.
2. After that you will be redirected to dashboard and click on settings and then click on SMTP users.
3. Click on Add SMTP USER and enter �</form><input type="date" onfocus="alert(1)"> this payload on username and save it.
4. After that down below click on webhooks and then continue and then ADD WEBHOOK and then from users select that user which we had created earlier and it will fire the pop up.
I had attached the PoC you can see it.
## Supporting Material/References:
* [attachment / reference]
## Impact
If one of these users executes malicious content, the attacker may be able to perform privileged operations on behalf of the user or gain access to sensitive data belonging to the user such as steal Cookies of user,etc.
Report Details
Additional information and metadata
State
Closed
Substate
Resolved
Submitted
Weakness
Cross-site Scripting (XSS) - Stored