Stored XSS on contact name

Disclosed: 2016-10-20 11:49:36 By dsopas To olx
Unknown
Vulnerability Details
Hi guys, I found a stored XSS in olx.pt. I didn't tested on other domains so feel free to update this report if other domains are also affected. When submiting a new ad, I added my XSS payload on data[person]. The ad got approved and no reflecting on this field. The output was sanitized. One thing that I know of was that the input wasn't, because if I edited the ad, the payload was launched so the input wasn't sanitized when added to the database. Then I remembered to check the "other ads from this person" and guess what? Stored XSS payload was launched and reflected on the page twice: <meta property="og:title" content="Todos os anúncios do utilizador Tomás Foz"><img src=x onerror=prompt(1)>"/> And: <h3 class="xxx-large fbold lheight24 c000">Tomás Foz"><img src=x onerror=prompt(1)></h3> Check my attached screenshot. This is very dangerous because it runs automatically when the victim visits the page: https://olx.pt/ads/user/GGSl/ Meanwhile I deleted the add to prevent any damage to your users. Hope it helps. Best, David Sopas @dsopas
Actions
View on HackerOne
Report Stats
  • Report ID: 152069
  • State: Closed
  • Substate: resolved
  • Upvotes: 5
Share this report