stored xss in getgrav/grav
Valid
Reported on
Mar 26th 2022
Description
Stored XSS is a vulnerability in which the attacker can execute arbitrary javascript code in the victim's browser. The XSS payload is stored in a webpage and it gets executed whenever someone visits that webpage
Proof of Concept
1. A low-priv user create a page with the following payload:
a'"></title></script><img src=x onerror=confirm(document.domain)></p>
2. Victim visit the page and see xss is executed
XSS alert will show the domain name.
Impact
Attacker can execute arbitrary javascript code in the victim's browser
We are processing your report and will contact the
getgrav/grav
team within 24 hours.
a year ago
We have contacted a member of the
getgrav/grav
team and are waiting to hear back
a year ago
We have sent a
follow up to the
getgrav/grav
team.
We will try again in 7 days.
a year ago
A getgrav/grav maintainer
modified the report
a year ago
A getgrav/grav maintainer
commented
a year ago
I consider admin privileges to be high -- you do need an admin account to perform this attack.
I was able to reproduce the issue.
We have sent a
fix follow up to the
getgrav/grav
team.
We will try again in 7 days.
a year ago
We have sent a
second
fix follow up to the
getgrav/grav
team.
We will try again in 10 days.
a year ago
We have sent a
third and final
fix follow up to the
getgrav/grav
team.
This report is now considered stale.
a year ago
Security.php#L32-L78
has been validated
Security.php#L83-L143
has been validated
Security.php#L150-L265
has been validated
to join this conversation