XSS (stored) Wizard is saving executable code

Disclosed: 2018-09-27 12:46:09 By 2444nitin To rocket_chat
Medium
Vulnerability Details
issue: xss(stored) Stored XSS occurs when a web application gathers input from a user which might be malicious, and then stores that input in a data store for later use. The stored input is not correctly filtered. As a consequence, the malicious data will appear to be part of the web site and run within the user’s browser under the privileges of the web application. poc: url: https://imgsrcxonerrorprompt2.rocket.chat ## Impact Attackers can execute scripts in a victim’s browser to hijack user sessions, deface web sites, insert hostile content, redirect users, hijack the user’s browser using malware, etc.
Actions
View on HackerOne
Report Stats
  • Report ID: 384517
  • State: Closed
  • Substate: resolved
  • Upvotes: 5
Share this report