Cross-site Scripting (XSS) in spiral-project/ihatemoney
Reported on
Jul 15th 2022
Description
ihatemoney is vulnerable to Cross-Site Scripting (XSS) when inviting people via email.
Steps to reproduce
1.Go to https://ihatemoney.org/
and try out the demo.
2.In the bottom left, click on Invite people.
3.In the Send via Emails section, input the payload: <img src=x onerror=alert(document.domain)>
into the People to notify field.
4.Click the Send the invitations button and you will see that a pop-up will display.
Impact
This vulnerability has the potential to deface websites, result in compromised user accounts, and can run malicious code on web pages, which can lead to a compromise of the user’s device.
Occurrences
Hi @maintainer, Why the CSRF on logout vulnerability has the severity of 8.8 (High) while the XSS vulnerability in my report is only marked with the severity of 4.4 (Medium)?
Can you explain how you calculate the CVSS score for this report? It is a bit unfair here.
You can see the CSRF on logout vulnerability in these report:
https://hackerone.com/reports/905831
and https://bugcrowd.com/disclosures/cfe6a8ef-24a9-4c8e-b75b-5134e8e085f3/csrf-leads-to-logout-any-loggedin-user-from-their-session
The severity of them are informational or low, but in your previous report, you still accepted it with High severity.
If so, why my report with the XSS vulnerability is only Medium (4.4)? I will be very happy if I know the reason for it. Many thanks!