Stored XSS via markdown link in usememos/memos
Valid
Reported on
Jan 5th 2023
Description
Markdown editor doesn't sanitize user's input, leads to stored XSS
Proof of Concept
[a](javascript:window.onerror=alert`poc`;throw%201)
Reproduce
1.Login to https://demo.usememos.com/
2.Create new memo with content
[a](javascript:window.onerror=alert`poc`;throw%201)
3.Ctrl+left click this link, javascript code has been executed
Impact
injects malicious content, phishing, session hijacking
Occurrences
We are processing your report and will contact the
usememos/memos
team within 24 hours.
4 days ago
We have contacted a member of the
usememos/memos
team and are waiting to hear back
3 days ago
The researcher's credibility has increased: +7
@admin can you assign a CVE for this vulnerability, please ?
ChangeMemoCreatedTsDialog.tsx#L42-L62
has been validated
to join this conversation