Stored XSS Via Markdown payload at HackerOne Settings in yogeshojha/rengine
Reported on
May 1st 2022
Description
Rengine supports automatic vulnerability reporting to hackerone the module included a feature to customize the report using a markdown editor. Although it was blocking some malicious payloads, the Cross-Site Scripting was found exploitable via a special payload.
Proof of Concept
1. Go to https://localhost/scanEngine/hackerone_settings
2. Scroll down to the Markdown editor and feed the payload [clickme](javascript:this;alert(document.cookie)) and save or click on eye icon.
3. Cick on the hyperlink "clickme"
4. XSS popup with CSRF token will appear.
Impact
Although the sessionid cookie is not readable due to samesite Cookie attribute but an attacker would be able to steal the victim's CSRF token and perform further CSRF attacks, localStorage data, etc.
Thank you for reporting this.
Please find the acknowledgment here.
https://github.com/yogeshojha/rengine/blob/release/1.2.0/.github/SECURITY.md
This will be available on Master once 1.2.0 is released.
I reduced severity to Low because this looks like self XSS to me. Feel free to correct me if I am wrong.
Thanks again. <3
Hi Yogesh, Thankyou for the response. I am wondering to ask if the report is not eligible for bounty or the decision is pending. Regards, Smaran