Self stored Xss + Login Csrf
Medium
Vulnerability Details
**Description:**
User can set username between 8-20 alphanumeric characters, but with the help of inspect element attacker can manipulate ```██████=``` & can insert a xss payload resulting in self stored xss & with the help of login csrf attacker can force the victim into attacker's account causing successful execution of javascript.
█████████
Payload used = ```"><img src onerror=confirm(document.cookie)>```
## Impact
Able to execute javascript in victim's browser
## System Host(s)
█████
## Affected Product(s) and Version(s)
## CVE Numbers
## Steps to Reproduce
1. Visit [Sign in](███████) and sign in
2. Click on Change username --> Open inspect element --> change max length of new username and confirm username to ```100```
3. Now enter the payload in``` new username``` and ```confirm username``` field & click on submit --> Sign out
4. Enter the credentials to sign in --> Intercept request using burp --> Action --> Engagement Tools --> Generate Csrf poc --> Copy html.
5. Open notepad & paste --> save as .html file
6. Open the html file in any browser to confirm the vulnerability.
Poc attached :-
███████
## Suggested Mitigation/Remediation Actions
Sanitization of input must be done
Actions
View on HackerOneReport Stats
- Report ID: 1092678
- State: Closed
- Substate: resolved
- Upvotes: 19