Bypass Stored XSS while creating a new post in usememos/memos

Valid

Reported on

Dec 30th 2022


Description

After login to portal create a new post and type the following text with XSS payload

bypass of this fix

Proof of Concept

Login to portal.
create a post with xss paylaod
save it
POC:  https://drive.google.com/file/d/1WkQpGyQGKBS-9To5mlud_qkkL7VOp9Au/view?usp=share_link

Bypass Payload

/*/**<input type="text" value=`` <div/onmouseover='alert(1)'>X</div>**/*/*

alt text

Impact

Users & admin account takeover

We are processing your report and will contact the usememos/memos team within 24 hours. 10 days ago
Anil Bhatt modified the report
10 days ago
STEVEN validated this vulnerability 10 days ago
Anil Bhatt has been awarded the disclosure bounty
The fix bounty is now up for grabs
The researcher's credibility has increased: +7
STEVEN marked this as fixed in 0.9.1 with commit 7670c9 9 days ago
STEVEN has been awarded the fix bounty
This vulnerability has been assigned a CVE
STEVEN published this vulnerability 9 days ago
to join this conversation