Cross-site Scripting (XSS) - Stored in livehelperchat/livehelperchat

Valid

Reported on

Aug 24th 2021


✍️ Description

Stored Xss on smtp/Sender address

🕵️‍♂️ Proof of Concept

Step To Reproduce:

  1. Go to system/smtp
  2. add the payload: "><svg/onload=prompt(document.cookie)> on "Sender address" or "Default from e-mail address" or "Default from name" [all the 3 params are vulnerable to xss]
  3. save it and you can see that the xss fires poc image: https://ibb.co/r7WxF2c

💥 Impact

Stored Xss

Occurences

We have contacted a member of the livehelperchat team and are waiting to hear back 3 months ago
Remigijus Kiminas validated this vulnerability 3 months ago
D3lT4 has been awarded the disclosure bounty
The fix bounty is now up for grabs
Remigijus Kiminas confirmed that a fix has been merged on b9207e 3 months ago
The fix bounty has been dropped