XSS (stored) Wizard is saving executable code
Medium
Vulnerability Details
issue: xss(stored)
Stored XSS occurs when a web application gathers input from a user which might be malicious, and then stores that input in a data store for later use. The stored input is not correctly filtered. As a consequence, the malicious data will appear to be part of the web site and run within the user’s browser under the privileges of the web application.
poc:
url: https://imgsrcxonerrorprompt2.rocket.chat
## Impact
Attackers can execute scripts in a victim’s browser to hijack user sessions, deface web sites, insert hostile content, redirect users, hijack the user’s browser using malware, etc.
Actions
View on HackerOneReport Stats
- Report ID: 384517
- State: Closed
- Substate: resolved
- Upvotes: 5