Cross-site Scripting (XSS) - Stored in livehelperchat/livehelperchat
Valid
Reported on
Aug 24th 2021
✍️ Description
Stored Xss on smtp/Sender address
🕵️♂️ Proof of Concept
Step To Reproduce:
- Go to system/smtp
- add the payload: "><svg/onload=prompt(document.cookie)> on "Sender address" or "Default from e-mail address" or "Default from name" [all the 3 params are vulnerable to xss]
- save it and you can see that the xss fires poc image: https://ibb.co/r7WxF2c
💥 Impact
Stored Xss
Occurrences
References
We have contacted a member of the
livehelperchat
team and are waiting to hear back
2 years ago
The fix bounty has been dropped
This vulnerability will not receive a CVE
to join this conversation