Reflected XSS on https://apps.topcoder.com/wiki/page/

Disclosed: 2020-05-12 13:49:07 By meryem0x To lab45
Medium
Vulnerability Details
## Summary: Hi :) A reflected XSS occurs on https://apps.topcoder.com/wiki/pages/doeditattachment.action when editing wiki pages attachments. ## Steps To Reproduce: A user can add attachments on https://apps.topcoder.com/wiki/pages/viewpageattachments.action?pageId=165871793 a wiki page and can edit on https://apps.topcoder.com/wiki/pages/editattachment.action?pageId=165871793&fileName=sss.svg. If there is an error, user redirected to `doeditattachment` path with an error message. An attacker can change the filename parameter and add JS codes. When a victim opens this url, XSS will execute. PoC: https://apps.topcoder.com/wiki/pages/doeditattachment.action?pageId=165871793&fileName=s%22%3E%3Cimg%20src=X%20onerror=alert(document.domain)%3Ess.svg {F816100} ## Impact XSS can use to steal cookies or to run arbitrary code on victim's browser.
Actions
View on HackerOne
Report Stats
  • Report ID: 866433
  • State: Closed
  • Substate: resolved
  • Upvotes: 18
Share this report