XSS on player.vimeo.com without user interaction and vimeo.com with user interaction
V
Vimeo
Submitted None
Actions:
Reported by
stefanovettorazzi
Vulnerability Details
Technical details and impact analysis
I reported this one in the report #87854, but I was asked to report it again in a separate report.
__Description__
At the end of each video appears the thumbnail of other video from the same user. This thumbnail has the title _More from [name_of_the_user]_.
The problem is that the name of the user is not escaped, which allows to execute Javascript code.
There is a limit for the length of characters that you can use for the name of the user, but it's enough to exploit it. The way I used for the proof of concept is setting the `window.name` to the Javascript code, and then put `<svg onload=eval(name)></svg>` as the name of the user.
__Proof of concept__
1. Download the file _name_xss_iframe.html_ that I attached.
2. Wait 10 seconds.
3. `prompt(document.domain,document.cookie)` is executed on https://player.vimeo.com.
4. Download the file _name_xss.html_ that I attached.
5. Click on _Watch video_.
6. Click on the button to play the video.
6. Wait 10 seconds.
7. `prompt(document.domain, document.cookie)` is executed on https://vimeo.com.
Report Details
Additional information and metadata
State
Closed
Substate
Resolved
Submitted
Weakness
Cross-site Scripting (XSS) - Generic