Complex xss to bypass protection in answerdev/answer
Valid
Reported on
Feb 8th 2023
Description
1.First we login as a normal user, and then comment under a question, the content of the comment is
<img src=x onerror=alert(document.domain)>
2.Then we login as an administrator user. And find the comment we just submitted, the administrator can click the edit button.Then the administrator Click "Save edits" without any modification.
3.Finally the comment will trigger xss.
Video link
linkhttps://drive.google.com/file/d/1mgqcm79b6ImBGISbp065utqZBZqrFk7n/view?usp=share_link
Impact
cause xss
We are processing your report and will contact the
answerdev/answer
team within 24 hours.
a month ago
We have contacted a member of the
answerdev/answer
team and are waiting to hear back
a month ago
The researcher's credibility has increased: +7
to join this conversation