Loading HuntDB...

CVE-2019-19935 - DOM based XSS in the froala editor

Low
L
lemlist
Submitted None
Reported by chackal

Vulnerability Details

Technical details and impact analysis

Cross-site Scripting (XSS) - DOM
## Summary: A stored XSS flow exist in the froala editor used in the web application. This can be trigger by using the code view of the editor ## Steps To Reproduce: 1. Start a new campaign 2. fill all the fieds and choose blank email template for the message 3. Switch to code editor view and inject `<iframe srcdoc="<img src=x onerror=alert(document.domain)>"></iframe>` {F919075} 4. Switch back to the normal editor view and the XSS will be trigger {F919076} See attachements. ## Supporting Material/References: Heavly inspired by the following article: [https://blog.compass-security.com/2020/07/yet-another-froala-0-day-xss/](https://blog.compass-security.com/2020/07/yet-another-froala-0-day-xss/) # Remediation: Unfortunately the froala editor did not provide correction for this bug yet but publish an advisory: [https://www.compass-security.com/fileadmin/Datein/Research/Advisories/CSNC-2020-004_DOM_XSS_in_Froala_WYSIWYG_HTML_Editor.txt](https://www.compass-security.com/fileadmin/Datein/Research/Advisories/CSNC-2020-004_DOM_XSS_in_Froala_WYSIWYG_HTML_Editor.txt) ## Impact This issue can lead to cookie stealing, creating fake form by including an iframe, DOM rewriting and so on.

Report Details

Additional information and metadata

State

Closed

Substate

Resolved

Submitted

Weakness

Cross-site Scripting (XSS) - DOM