H1514 Server Side Template Injection in Return Magic email templates?

Disclosed: 2019-04-04 17:35:23 By zombiehelp54 To shopify
Unknown
Vulnerability Details
**Summary:** Possible template injection in return magic email templates. **Description:** I've been playing with return magic workflow email templates and there seems to be some kinda of template injection but I am not sure if it's exploitable or even valid. Here is why I think it could be vulnerable: I set the email template to the following and then test the template and then the results go to my gmail inbox. `{{ this }} ` -> `[Object Object]` `{{ this.__proto__ }}` --> `[Object Object]` `{{ this.__proto__.constructor.name }}` --> `Object` I couldn't go further but it seems like the backend is NodeJs. ## Steps To Reproduce: 1. Install Return Magic app 2. Navigate to `https://<shop>.myshopify.com/admin/apps/returnmagic` 3. Open Settings tab from the top menu and then open **Emails** --> **Workflow** from the left menu 4. Click Edit for any email template then at the editor click the code icon and enter `{{this}}` 5. Go back to **Workflow** page and click **Send me a test email** for the template you edited then enter your email and check your inbox. 6. You'll see `[Object Object]` ## Supporting Material/References: {F360290} {F360291} ## Impact Could be a Server Side template injection that can be used to take over the server ¯\_(ツ)_/¯
Actions
View on HackerOne
Report Stats
  • Report ID: 423541
  • State: Closed
  • Substate: resolved
  • Upvotes: 401
Share this report