Cross-site Scripting (XSS) - Stored in vanessa219/vditor

Valid

Reported on

Jan 23rd 2022


Description

The Vanessa219/vditor is a markdown editor supported by browsers. When a user creates a link using the markdown syntax, the server does not URL-encode the double-quotes, so the user can escape the href attribute and trigger XSS using the on* attribute.

Proof of Concept

XSS PoC : [xss](https://google.com/"//onmousemove="alert(document.domain))
> I can insert an onerror. But I can't log in without a Chinese phone number, so I can't test

1. Open the https://ld246.com/guide/markdown
2. Enter the XSS PoC (Strangely, it doesn't insert at once, so I have to try inserting several times)
3. When the user hovers the mouse over the link, XSS is triggered via a mouse event.

Video : https://www.youtube.com/watch?v=pKQMbrezdCs

Impact

Through this vulnerability, an attacker is capable to execute malicious scripts.

We are processing your report and will contact the vanessa219/vditor team within 24 hours. 4 months ago
Pocas modified the report
4 months ago
We have contacted a member of the vanessa219/vditor team and are waiting to hear back 4 months ago
V validated this vulnerability 4 months ago
Pocas has been awarded the disclosure bounty
The fix bounty is now up for grabs
V confirmed that a fix has been merged on 219f8a 2 months ago
V has been awarded the fix bounty
to join this conversation