Cross-site Scripting (XSS) - Stored in getgrav/grav
Valid
Reported on
Jan 2nd 2022
Description
Stored XSS is a vulnerability in which the attacker can execute arbitrary javascript code in the victim's browser. The XSS payload is stored in a webpage and it gets executed whenever someone visits that webpage.
I used :
instead of :
in the href
attribute of <a>
tag to bypass the xss checks happening in the application.
Proof of Concept
1 A low-priv user create a page with the following payload:
<a href="javascript:alert(document.domain)">CLICK HERE TO EXPLOIT THIS XSS</a>
2 Victim visit the page and click on CLICK HERE TO EXPLOIT THIS XSS
XSS alert will show the domain name.
Impact
Attacker can execute arbitrary javascript code in the victim's browser
Occurrences
We are processing your report and will contact the
getgrav/grav
team within 24 hours.
a year ago
We have contacted a member of the
getgrav/grav
team and are waiting to hear back
a year ago
We have sent a
follow up to the
getgrav/grav
team.
We will try again in 7 days.
a year ago
We have sent a
second
follow up to the
getgrav/grav
team.
We will try again in 10 days.
a year ago
Security.php#L82-L239
has been validated
to join this conversation