Bypass Stored XSS while creating a new post in usememos/memos

Valid

Reported on

Dec 30th 2022


Description

After login to portal create a new post and type the following text with XSS payload

bypass of this fix

Proof of Concept

Login to portal.
create a post with xss paylaod
save it
POC:  https://drive.google.com/file/d/1WkQpGyQGKBS-9To5mlud_qkkL7VOp9Au/view?usp=share_link

Bypass Payload

/*/**<input type="text" value=`` <div/onmouseover='alert(1)'>X</div>**/*/*

alt text

Impact

Users & admin account takeover

We are processing your report and will contact the usememos/memos team within 24 hours. 4 months ago
Anil Bhatt modified the report
4 months ago
STEVEN validated this vulnerability 4 months ago
Anil Bhatt has been awarded the disclosure bounty
The fix bounty is now up for grabs
The researcher's credibility has increased: +7
STEVEN marked this as fixed in 0.9.1 with commit 7670c9 4 months ago
STEVEN has been awarded the fix bounty
This vulnerability has been assigned a CVE
STEVEN published this vulnerability 4 months ago
to join this conversation