Stored XSS in Intense Debate comment system
High
Vulnerability Details
Hi Team,
## _Summary:_
The Intense Debate comment system is vulnerable to stored xss by users , this would allow for atacking admins/users on the blog ,
## Platform(s) Affected:
* Intense Debate comment system
________________________________________________________________________________________
________________________________________________________________________________________
## _Steps To Reproduce:_
1. Go to **intensedebate.com/moderate/{{-ID-}}**
2. Go to comments > allow images in comments
3. Now go to your blog and add this payload as comment :
```html
<img src="https://intensedebate.com/images/a-addblog.png" onload="alert()">
```
4. You'll notice the alert will pop as result for the "onload" attribute ,
________________________________________________________________________________________
________________________________________________________________________________________
A helpful video :
{F1087899}
## Impact
* Stealing cookie and secter tokens
* Editing html/css/js content for phishing attacks
Thanks for taking your valuable time to read and validate this report
Actions
View on HackerOneReport Stats
- Report ID: 1039750
- State: Closed
- Substate: resolved
- Upvotes: 52