Cross site scripting - XSRF Token

Disclosed: 2020-06-14 10:40:47 By a9hora To nextcloud
Medium
Vulnerability Details
Please follow below mentioned steps for reproducing the vulnerability. 1. Open URL: https://nextcloud.com/enterprise/buy/ 2. Fill up valid name and email address and put payload in other fields. Payload/s: <img src="x" onload=alert(document.cookie);> <svg/onload=alert(document.cookie);> 3. Submit it 4. Open email address you mentioned in the email field. 5. Open up the email source. 6. You will be prompted with xsrf-token. ## Impact As an attacker is getting the xsrf-token, he can utilize it in later attack such as, CSRF.
Actions
View on HackerOne
Report Stats
  • Report ID: 858255
  • State: Closed
  • Substate: resolved
  • Upvotes: 32
Share this report