Stored XSS in community.ubnt.com

Disclosed: 2017-04-28 09:55:44 By vibs123i To ui
High
Vulnerability Details
I have created two accounts one attacker account: vibhuti123_i other victim account: John_victim attacker account:vibhuti123_i who will create a malicious link after uploading svg file embeded with script and doing stored xss.Now attacker vibhuti123_i will send this stored xss malicious link to victim:john_victim by posts,message,reply of ubnt community features or anyother way of communication.After this John_victim will believe this link as it is saved on community.ubnt.com server.It's no way look dangerous so john_victim will click this link and xss gets executed. This stored xss link created by attacker will execute in every account and also it is accessible without login. http://community.ubnt.com/t5/image/serverpage/image-id/0iA7662344C5BC7B7E/image-size/thumb/is-preview/true?v=v2&px=100 Please go through Video POC:-- https://youtu.be/Z0UCmv-Tpqs PLease read the Document of OWASP.org about svg xss below: https://www.owasp.org/images/0/03/Mario_Heiderich_OWASP_Sweden_The_image_that_called_me.pdf
Actions
View on HackerOne
Report Stats
  • Report ID: 179164
  • State: Closed
  • Substate: resolved
  • Upvotes: 21
Share this report