Stored XSS on this link https://sehacure.slack.com/help/requests/

Disclosed: 2014-08-30 07:19:46 By anandpingsafe To slack
Unknown
Vulnerability Details
Hi, This is a little tricky one. First of all go to your profile page and change your name to "><img src=x onerror=prompt(12);> Save it. Wait!!! You will not see a javascript pop up there because there is proper input validation on the profile page. Now to see the prompt box 1) Go to this link https://sehacure.slack.com/help/requests/new 2) Add a new ticket. Now submit it. 3) Now view your ticket.You will now be shown a prompt box. 4) Please have a look at the attached screenshot the inputs are not validated over there. I have changed my name to }') ">ppp> and i am attaching the source code view of the same.No, input encoding is done there. Please have a check. Best, Anand
Actions
View on HackerOne
Report Stats
  • Report ID: 2639
  • State: Closed
  • Substate: resolved
  • Upvotes: 5
Share this report