Cross site scripting - XSRF Token
Medium
Vulnerability Details
Please follow below mentioned steps for reproducing the vulnerability.
1. Open URL: https://nextcloud.com/enterprise/buy/
2. Fill up valid name and email address and put payload in other fields.
Payload/s:
<img src="x" onload=alert(document.cookie);>
<svg/onload=alert(document.cookie);>
3. Submit it
4. Open email address you mentioned in the email field.
5. Open up the email source.
6. You will be prompted with xsrf-token.
## Impact
As an attacker is getting the xsrf-token, he can utilize it in later attack such as, CSRF.
Actions
View on HackerOneReport Stats
- Report ID: 858255
- State: Closed
- Substate: resolved
- Upvotes: 32