XSS vulnerable parameter in a location hash
Unknown
Vulnerability Details
Hi!
There is a vulnerability on your pages, using convertro.
Vulnerable parameter from location hash (cvo_sid1), used in your live.js to call convertro code without sanitizing. On the convertro side it is sanitized, but with help of this parameter you could push another parameter (typ), that leads to generating malformed javascript answer with XSS injection ability. Like this : cvo_sid1=111\u0026;typ=[code injection] , where \u0026; is an ampersand symbol.
See screenshots below.
There is a restriction on a semicolon use, so i replaced it with %3b.
To reproduce vulnerability, you could try this safe example:
https://slack.com/is#?cvo_sid1=111\u0026;typ=55577]")%3balert(document.cookie)%3b//
This vulnerability provides a great opportunity for victim to lose not only cookies, but also control over the account after stealth forwarding to porposely generated link like this. I think, you know ;)
Actions
View on HackerOneReport Stats
- Report ID: 146336
- State: Closed
- Substate: resolved
- Upvotes: 444