Javascript Payload reflected Back in Report Embed Code

Disclosed: 2017-12-12 14:53:09 By zubair To infogram
Low
Vulnerability Details
1)Create new Report template 2)Spoof its name with payload "></div> My Report <script type="text/javascript">alert(document.cookie);</script><div id=" 3)Visit Back to your library list https://infogram.com/app/#/library 4)Select The Created report and click view on web,Click the Share Button 5)Copy & embed the code somewhere in html file you ll triage the Javascript exceution The Payload is reflected in embed code and can compromise the embed code user's PRivacy. Fix:Report/Project name need to be escaped properly For reproduction of issue use: https://infogram.com/greaterreport-classic-lessdivgreaterlessscriptgreateralerttestlessscriptgreater-1g0gmjzqk1y3p1q
Actions
View on HackerOne
Report Stats
  • Report ID: 284082
  • State: Closed
  • Substate: resolved
  • Upvotes: 4
Share this report