Stored XSS on https://app.crowdsignal.com/surveys/[Survey-Id]/question - Bypass

Disclosed: 2020-11-18 14:20:21 By ali To automattic
High
Vulnerability Details
Hello there, I hope all is well! I found a stored xss on https://app.crowdsignal.com/ Steps: * Go to `https://app.crowdsignal.com/dashboard` * Create a survey. * Go to `https://app.crowdsignal.com/quizzes/{survey-id}/question` * Add `Multiple Choice` * Click `Add media` button. * Select `Embed Media` * Paste this: `[dailymotion id=x8oma9]` * Insert it. * Open Burp Suite and click `Save` button. * Return to burp suite and paste xss payload to `media[11111111]` parameter: `[dailymotion id=x8oma9"><svg/onload=prompt(document.domain)>]` * Forward the request and refresh the page. You will see xss alert. This isn't self xss because I saw users who Team plan can invite other users to their dashboards. So attacker can steal victim's cookies. Also I recorded a poc video for you: {F975177} ## Impact Stealing cookies. Best Regards, @mygf
Actions
View on HackerOne
Report Stats
  • Report ID: 974271
  • State: Closed
  • Substate: resolved
  • Upvotes: 76
Share this report