Cross-site Scripting (XSS) - Stored in vanessa219/vditor
Valid
Reported on
Jan 23rd 2022
Description
The Vanessa219/vditor is a markdown editor supported by browsers. When a user creates a link using the markdown syntax, the server does not URL-encode the double-quotes, so the user can escape the href attribute and trigger XSS using the on* attribute.
Proof of Concept
XSS PoC : [xss](https://google.com/"//onmousemove="alert(document.domain))
> I can insert an onerror. But I can't log in without a Chinese phone number, so I can't test
1. Open the https://ld246.com/guide/markdown
2. Enter the XSS PoC (Strangely, it doesn't insert at once, so I have to try inserting several times)
3. When the user hovers the mouse over the link, XSS is triggered via a mouse event.
Video : https://www.youtube.com/watch?v=pKQMbrezdCs
Impact
Through this vulnerability, an attacker is capable to execute malicious scripts.
We are processing your report and will contact the
vanessa219/vditor
team within 24 hours.
a year ago
Pocas modified the report
a year ago
We have contacted a member of the
vanessa219/vditor
team and are waiting to hear back
a year ago
to join this conversation