Loading HuntDB...

Stored XSS on https://app.crowdsignal.com/surveys/[Survey-Id]/question - Bypass

High
A
Automattic
Submitted None
Reported by ali

Vulnerability Details

Technical details and impact analysis

Cross-site Scripting (XSS) - Stored
Hello there, I hope all is well! I found a stored xss on https://app.crowdsignal.com/ Steps: * Go to `https://app.crowdsignal.com/dashboard` * Create a survey. * Go to `https://app.crowdsignal.com/quizzes/{survey-id}/question` * Add `Multiple Choice` * Click `Add media` button. * Select `Embed Media` * Paste this: `[dailymotion id=x8oma9]` * Insert it. * Open Burp Suite and click `Save` button. * Return to burp suite and paste xss payload to `media[11111111]` parameter: `[dailymotion id=x8oma9"><svg/onload=prompt(document.domain)>]` * Forward the request and refresh the page. You will see xss alert. This isn't self xss because I saw users who Team plan can invite other users to their dashboards. So attacker can steal victim's cookies. Also I recorded a poc video for you: {F975177} ## Impact Stealing cookies. Best Regards, @mygf

Report Details

Additional information and metadata

State

Closed

Substate

Resolved

Submitted

Weakness

Cross-site Scripting (XSS) - Stored