Stored XSS through name / last name on https://██████████/
High
Vulnerability Details
**Description:**
There is stored XSS Vulnerability on https://█████/██████ by rendering unsafe input being registered on the account name and last name.
███
## Step-by-step Reproduction Instructions
1. Navigate to
```javascript
https://█████/login/?next=/███%3Fresponse_type%3Dcode%26redirect_uri%3Dhttps%253A%252F%252F████████%252Fcgi%252Flogin.cgi%253Freturn_to%253Dhttps%25253A%25252F%25252F███████%25252Fcgi%25252Fmyaccount.cgi%26client_id%3D6G3AXPQNPXK5SVESYCB8AMCPHQQ3ENCRK8G2QNWY%26state%3DBEAEb6NGMQ7kWZwZS2pNNFv4p7JwBk86%26scope%3Dopenid%2520profile
```
2. Create your account, with your name as <IMG SRC=X ONERROR=ALERT(1)>
3. Log in and navigate to https://███/██████
## Suggested Mitigation/Remediation Actions
Sanitizing the input on the account name fields will prevent the issue.
##Best Regards
nagli
## Impact
Executing javascript on behalf of the victim
Actions
View on HackerOneReport Stats
- Report ID: 1072616
- State: Closed
- Substate: resolved
- Upvotes: 4