Reflected XSS on https://apps.topcoder.com/wiki/

Disclosed: 2020-05-12 13:48:28 By meryem0x To lab45
Medium
Vulnerability Details
## Summary: Hi :) A reflected XSS occurs on https://apps.topcoder.com/wiki/plugins/tinymce/wysiwyg-insertlink.action when creating wiki pages. ## Steps To Reproduce: A user can create wiki page on https://apps.topcoder.com/wiki/pages/createpage.action?spaceKey=tcwiki. A url can be inserted this page. When you click `Insert/Edit url` https://apps.topcoder.com/wiki/plugins/tinymce/wysiwyg-insertlink.action?draftType=page&spaceKey=tcwiki&currentspace=tcwiki&formname=createpageform&fieldname=wysiwygcontent&alias= page opens. You can change `alias` parameter and add `tooltip` parameter with JS codes. If a victim opens this url, XSS will execute. PoC: https://apps.topcoder.com/wiki/plugins/tinymce/wysiwyg-insertlink.action?draftType=page&spaceKey=tcwiki&currentspace=tcwiki&formname=createpageform&fieldname=wysiwygcontent&alias=as%22%3E%3Cimg%20src=x%20onerror=alert(document.domain)%3E&tooltip=as%22%3E%3Cimg%20src=X%20onerror=alert(document.cookie)%3E {F816079} {F816080} ## Impact XSS can use to steal cookies or to run arbitrary code on victim's browser.
Actions
View on HackerOne
Report Stats
  • Report ID: 866426
  • State: Closed
  • Substate: resolved
  • Upvotes: 11
Share this report